0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000240)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="4a94fbca152d78adf1d501f0d1fff915ca007051318eba4dfeab9c0012b0347ab15b768e0b55208831262677eaf3cf30"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 642.649784] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 642.737298] gfs2: not a GFS2 filesystem 18:04:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reicerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 642.766124] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:34 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x400040000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) dup(r6) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r6, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 642.806388] input: syz1 as /devices/virtual/input/input1130 18:04:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) [ 642.869796] input: syz1 as /devices/virtual/input/input1131 18:04:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000bc0), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) r2 = accept4$inet(r0, &(0x7f0000000000), &(0x7f0000000240)=0x10, 0x80000) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000b80)) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = getpid() sched_setaffinity(r4, 0x8, &(0x7f00000002c0)=0x4) dup(r3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="73756375726974792e9d471f000000000000000000000000000000008e98b4b76d1e630b11efe7cd3777c63a8d8e65dad1fcad61b4c9661ccee1ae51766c63036dfb304b02c6967bc7ae9bd8d015c4fe8e0bf420a204fca88567c09b11789e0900000000000000eb2b7750001b00264ea6e771810845610462f14ef3b8d09ea06d103be3d30f3a322f251d0f430d933e551cfbb315b91ae1b3a6b426fea4a0533903ef862b515a3b33f0576b48d926263b849a3ecaf32e1e5307011c"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:34 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb8a1a3b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2639ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9dd2f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) [ 643.130504] input: syz1 as /devices/virtual/input/input1132 [ 643.201911] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) [ 643.261079] input: syz1 as /devices/virtual/input/input1133 18:04:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiderfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 643.376509] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 18:04:35 executing program 2: r0 = socket(0x2, 0x802, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x8007ffc) sendfile(r0, r1, 0x0, 0x400008bca) 18:04:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000000)={0x0, 0x0, {0x8872, 0xfffffffeffffffff, 0x9, 0x1ff}}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000e00)=ANY=[@ANYBLOB="73756375726974792e766574d52a592a514ed1f53452d6683100000000ffffffffffef003a344f6091820786e88e2f0a81f29cc8ef31e620f7a16e4f0e46ff12000000005f6648ddb0310248f43dae7f40018847a9dbfa4ead9eea9dd20d386374a81f9816e5312dbbe9c60061dad287129fee916930a0c494106802c474e4435523a947185f84ca6d67052cdd54af326fefc23086cbf07621101069096c71b30c61d2e16f3fd851f0a5c2f0d4f63c0ff238353d9cee7571120cd7857d91af3e790c6a58fcbc9ea376133bdd0ff071dff939ab124d31e0dcdd7e0e9fe80359acc8bcf22c2a69a9445bfafb9105839058544fda41b14412600d5399578941803cdbb044d899160d07ccb8b286827c00b5bb32f80bb4f84c0bb5b5767209a1bb73926c931b413fa6285775ed75ae61ee455da5405bb3bde2ea95"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, 0x0, 0x0, 0x0) 18:04:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:35 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg(r7, &(0x7f0000001b80)={&(0x7f0000000280)=@hci={0x1f, r9}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000340)="edff8f08ef61c9a43e2afa43dfd258973ce99b974852e90b157c380f306b50cbca78aebd77efc79e1cda33c4e3681085ee47a2d2ec708083fa33dc93eb48a97bcdd9d062f05e62332dbf084892a8cca050f14ca67137125f", 0x58}, {&(0x7f0000000580)="da9b3d4c853e6c44bf5d432d28aa8030cbc3212b0cdbbd7aae9cf48992884f0cdd959ccef1eca54479ac07ceacdaecac615834d38c85b2502f1781ef5585b6d9e8e47988fa49ec0260f17bb167e23ee3de9fb69a76db305781547f33bdd765f751b7597e73221a5aa326dd9e11a1fc99820eca623f89ae1bc5cc5465acdb43", 0x7f}, {&(0x7f0000000640)="41fc73589344ebd71eba59b754d8e6c37c1ebbbe90b252259e37bbb9f4bf060b5eac0536268c6be6152e6ed22f441b5d1ec7b29f9b3893b527e02027658162178030c2e363bc7afd2540d1256fbefc76e26a27d9c9b085aab9493e8ec093c26fe2612306d271c7fc77293a", 0x6b}, {&(0x7f0000000440)="c8442a3f6dd2", 0x6}, {&(0x7f00000006c0)="5d2f3010eef7e4ed8ae444acf0a6382d5e95d933a841618daaa2bf78875627b91ba734907f417b8c152ea607bac700d019819547450fdc7140f243251f7c36ff408cd1592b6147673656a51510331baba41ce2e064c3eea5a68aae084c357c5c507606b8d2e251a55b994ca89fa7dd6f9d29e3f71b979a7de2245197f0c0fe58a151193335c3dbe409a2d3bc664cee10f4052e48907497f5450ebe1255427c0530dd4143314b14ace6617b4a5678a763ccc3013a58d32d3054489b1322ab0d0ed7c1eb1765a072fcf70c14fbe50627e546e3d4e699d3483dc938aee950e693a0a1a628062e2d6350929cdbe4e6969faf1b81", 0xf2}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="5df726911c0bb15872e95d4c839cf5396acdf79473e0", 0x16}], 0x7, &(0x7f0000001880)=[{0xd8, 0x29, 0x1, "ba3b344c25897aa7632fe1f915c62260934a5b067f4dc499a2a6504cfcfff9f9b23a8dfd9bbe0117031982daba52cbdad6cbfb316e6dfa4220e30667143eb59aaa4e6ec97bd7d50648e95eb458bed14270f197489c7ba9cd2d14e2d399a20d6f10521aba8f154f57325bc36c9aeae42c6b3ec7f956eb227f1214f34b121904f3db34a69ea191dfb4daf7bf924e9235c39ee2ca98a2fd5f15423ed65461f12b179bb44e5e4cfd150324370359c2c3dfea0baef3fc653a46051b131f068d2b496a2c75cb"}, {0xb8, 0x10f, 0x8, "1bf403107cb40f927f214ba78add46660a428f63c108b36fd6ba90383fae975eb413eb4e9da386a27eff379b274dd17e1e46e65397ae6566da362848fb472d14d0b4bac12479d06b7457117bdb1003090008dc0db50476dc0ffb5c389f5d87a1c7d9ca4c53f74f4bb65f4eeb8eca657cef86d987f6417879306e8aa794af5be4876804c67454d2ba9c80810d835274994928e8bbead861d7708543bb057da12f3e9a"}, {0x60, 0x109, 0x5, "d9ddd0a9fb3bef1a1129963f7c589ebb4cf8a95b20723547b00b16fcc71ac9096cd21a10741d76f1731d193db0161974693e560aeb649b4ba01ca6690677ae270ee52ec7f145a4a1de18ff08354b"}, {0x78, 0x10f, 0x0, "f38c6fbee984b67a0cc0f5216aefb0e2cfaba58e32c84371a794e94de8cbfa42edf16230f468390f33000c567ae4682df4a4d3f803e22a0e8af9ab14a61d1505fb6e7cecf1d99af703b288de79ea6682d227e11139a2b239264cc78643d9ee88eff8e1cbff91"}, {0x58, 0x10d, 0x0, "ac3711675bb55a54d11c69226328d37c4413c4219cbecd2bbe01a8a0f8431628e53d644b8a606c887b0545dee025341ee66256c99e2e38945af6121bc446c3fd34e7d1b3982374d6"}, {0x20, 0x117, 0x7ff, "e810bb1c83b67986edd1ce63"}], 0x2e0}, 0x4000) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r8, r6) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, 0x0, 0x0, 0x0) [ 643.598214] input: syz1 as /devices/virtual/input/input1134 18:04:35 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73087a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiherfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 643.740066] input: syz1 as /devices/virtual/input/input1135 [ 643.770828] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, 0x0, 0x0, 0x0) 18:04:35 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0xfff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffff800, 0xf, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x200600) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0xda2, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x348da6ed, 0x4, 0x0, 0xffffffff, 0x7fffffff, 0x9, 0x3, 0x8000, 0x4a6, 0x7, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x8, 0x8}, 0x0, 0x0, r0, 0x2) 18:04:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, 0x0, 0x0, 0x0) [ 643.929429] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40900, 0x40) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000b80), 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="736563757200000000ffffffffff497a46c4a1937bb0000000"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:35 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f9c2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000000)="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") ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000003c0)={0x0, 0xce, "08e83fda8fd6852e0a3cc0ee69d46f8b91f27ba28f7b6b60f5529de0ffaf2bea63873823fd0c54bd5a55258eea27f5b333922c432974d9bf25369fcd4cdf0259c914a764ce3a19b87be93c078fdabf5b24789dcdd24b72599153da977bd29083b4eed01378b5711f213159aa56c752be51a6454955aeff37315e90488d57d41bc0f7507170aa2b6ce348c6aa2f3adb7d2e359e412c210e6418e088814ef16567066d6835ce9e2a61f73f00c9eb421f288cc45cca3b307869cfc26f5e3bde04613f2eb7a892c20627f06455ace35a"}, 0x0) [ 644.127185] input: syz1 as /devices/virtual/input/input1136 18:04:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, 0x0, 0x0, 0x0) 18:04:36 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xffffffff80000000, 0x4000) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiierfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, 0x0, 0x0, 0x0) [ 644.469862] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000b80), &(0x7f0000000200)=0xfffffe72) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)=0x4) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, 0x0, 0x0, 0x0) 18:04:36 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) lsetxattr$security_smack_transmute(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000580)='TRUE', 0x4, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x3ff, 0x7fff, 0x40, 0xfffffffffffffffa, 0x0, 0x0, 0x801a8, 0x1, 0x401, 0x3, 0x8d6, 0x1, 0x3, 0x3, 0x9, 0xc348, 0xde8d, 0x8, 0x8, 0x5, 0x826, 0x6, 0x5, 0x80000000, 0x2, 0x101, 0x80000001, 0x9, 0x2, 0x0, 0x2, 0x58c, 0x2, 0x5, 0x10000, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x9, 0x4a}, 0x5, 0x5c6b, 0x3f, 0x0, 0x0, 0x6, 0x9}, r0, 0xd, r7, 0x2) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) write$P9_RMKNOD(r7, &(0x7f0000000280)={0x14, 0x13, 0x2, {0x10, 0x4, 0x4}}, 0x14) r10 = dup2(r9, r6) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fd856868149c86e941e9ed6b0811e115544d2636be5b9f480f4240a0000000000007977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 644.610798] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, 0x0, 0x0, 0x0) [ 644.732180] input: syz1 as /devices/virtual/input/input1138 18:04:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reikerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 644.950333] input: syz1 as /devices/virtual/input/input1139 18:04:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, 0x0, 0x0, 0x0) [ 645.185278] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:37 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'veth1\x00'}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x6, 0x0) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f00000004c0)='veth0_to_bond\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x127b, r2) sendmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000940)}], 0x1, 0x0, 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 18:04:37 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) r5 = socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r5) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) socket$inet6_udp(0xa, 0x2, 0x0) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x23, 0x0, 0x0, 0x0) [ 645.333056] input: syz1 as /devices/virtual/input/input1140 [ 645.359404] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e, 0x0, 0x0, 0x0) 18:04:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:37 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r1, r2, 0x15) r3 = socket(0x40000000015, 0x805, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) accept4$inet(r3, 0x0, &(0x7f0000000040), 0x800) getsockopt(r3, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 645.501818] input: syz1 as /devices/virtual/input/input1141 18:04:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48, 0x0, 0x0, 0x0) 18:04:37 executing program 2: seccomp(0x200000001, 0xfffffffffffffffc, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x24000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:04:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmmsg$alg(r1, &(0x7f0000000000), 0x0, 0x20000041) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000240)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r3, 0x50, &(0x7f0000000cc0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d40)={r4, r1, 0x0, 0xc, &(0x7f0000000b80)='/dev/uinput\x00', r5}, 0x30) syz_mount_image$jfs(&(0x7f0000000d80)='jfs\x00', &(0x7f0000000dc0)='./file0\x00', 0x803, 0x0, &(0x7f0000000e00), 0x2000000, &(0x7f0000000e40)={[{@nointegrity='nointegrity'}, {@errors_continue='errors=continue'}, {@usrquota='usrquota'}, {@errors_remount='errors=remount-ro'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@obj_type={'obj_type', 0x3d, 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000006, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reilerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 645.771867] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 645.814825] input: syz1 as /devices/virtual/input/input1142 18:04:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, 0x0) [ 645.856986] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x1000, 0x2, 0xa45, 0x7, 0x1f}) prctl$PR_SET_PDEATHSIG(0x1, 0x2c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xffffffffffffffff) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x18) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x1de, &(0x7f0000000140)}) ioctl$TCFLSH(r2, 0x80047456, 0x709000) 18:04:37 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) getsockopt$nfc_llcp(r3, 0x118, 0x3, &(0x7f00000001c0)=""/53, 0x35) 18:04:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x60, 0x0, 0x0, 0x0) 18:04:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000240)=""/18, &(0x7f0000000b80)=0x12) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x5, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68, 0x0, 0x0, 0x0) 18:04:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reioerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000040)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:04:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, 0x0) [ 646.293789] input: syz1 as /devices/virtual/input/input1144 18:04:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x74, 0x0, 0x0, 0x0) [ 646.469502] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:38 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000700)={0x5, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e21, @empty}}}, 0x108) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000640)={{0x8000}, 'port0\x00', 0x50, 0x1000, 0x7, 0x2, 0x1, 0x7, 0x1, 0x0, 0x4, 0xffffffff}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r3, 0x2, 0x1}, 0x14) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback, 0x1}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) pipe(&(0x7f0000000280)) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d133816e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7c9ed06877047b6bac5568d60b4c37075bca73983fd7482b9134aa77d477a9242f58195b20c952152ce0f2526d6d4e075ea8d420eb47f6dae46d17017e4ba300000000000000c4fe4c4ab0e58d110a9ce16b7eb600"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:38 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x85, 0x381000) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000080)={@initdev}, &(0x7f00000000c0)=0x14) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x2) write$P9_RCLUNK(r0, &(0x7f0000000100)={0x7, 0x79, 0x2}, 0x7) ioperm(0x1, 0x3, 0x10001) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="1e754a7c4745796ccad71de336e8f79a5a3a6187fb997ffcfc0aed595ca067d2a9e793715223036d1e256365a6dc9e2b3fbe06d0e890835a506024517083710d1206408014e7b580852cb4f6582442198ec1b9b9b828ff938751b1a448617eb65cdcb8958c33f9d7abb9ecefeaccbca3fe7c59b96d1457fe019df61fa2a2a278690d1cb6bfc337470f4be79b42bb7e77eb83e6cb4cfa80c0c0a666324a7f764ba55d5ace8af436743cf8366ceaffe05a466506736b2953021d94c519600e0f6ece6321d37409e79400c1d2c9fa9a3b80", 0xd0, 0xfffffffffffffffb) keyctl$update(0x2, r3, &(0x7f0000000300)="92395653c9fb8a085febc76df821e6994ad727971a92931aa48110a8111482d5dc389e36f178b86d8dc94f25beba6d5de5552d42402c42721636531a49cb96b04be22ea2fb27ee9a65744581a198516f20f6fb1678baf55641fd750ceef2094ae998f47bcc92624a36e3d37ee0d411a456a497d1d5a433ff00dbfa12c12ccbd3d7b8b912b3674235501fa9b0bceb7d72ab49c91f73c19fde54ac867098afd40c1d27c989227d014ed10c75968e6ea7f38606b2063550009e7a692edd8330951d986525bf2ac4e1bf72a0f381ff0f54ce8acaf2206e374ae9a47acb0840ce1dd5f8a6d3e17376684766cb74390f37e23ecc1e2a53e0", 0xf5) ioctl$TCXONC(r1, 0x40087101, 0x712000) [ 646.529206] input: syz1 as /devices/virtual/input/input1145 [ 646.656589] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6}, 0x48) 18:04:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1bc) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000240)={0x0, 0x0}) r3 = dup2(r0, r0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000b80)={r2, 0x80000, r3}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000bc0)='./file0\x00', 0x58e, 0x3, &(0x7f0000001000)=[{&(0x7f0000001080)="bff5da5f7b8a14721cee9ad7ee522c902ff23c4d1d0773493482f827f05cf3ab1d85a80af616184c6d0ae1495e061b49b5b53a7d4643f0f77ff5732c5cae717062ad3b0394776d1e89306090c9bac4726f620aaadb0198d0b7b90bb2e476c12452981fdca69437f1347250bb9fe4d64bfcafda3a1719cc5a588b01bb1455133a1c68d529386a712a3f1dbd1c80ae8393312523262eb25e221a9afb052c2c0054cb34f627533842b63fdbb65c5a9649a1413113acfb89f97be8405bfe0dfc47cd07b408bf18577cd8ec0ed948780b5a9c8dacc9daa70e1bc177dd1ec957ce6166aaab96caf8fe", 0xe1, 0x2}, {&(0x7f0000004600)="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", 0x1000, 0x8}, {&(0x7f0000003600)="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", 0x60, 0x800000008}], 0x440, 0x0) getsockopt$inet_dccp_int(r5, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r6, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}, 0x45c) dup(r4) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r6, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiperfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, 0x0) 18:04:38 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x2) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendto$rose(r6, &(0x7f0000000640)="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", 0x1000, 0x44080, &(0x7f00000001c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @default}, 0x1c) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x71, 0x3, 0x8, 0x200}, {0x3, 0x9, 0x1de}, {0x7, 0x8, 0x8, 0x5}]}) [ 646.835681] input: syz1 as /devices/virtual/input/input1146 18:04:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa0, 0x0, 0x0, 0x0) [ 646.920780] gfs2: not a GFS2 filesystem [ 646.972440] input: syz1 as /devices/virtual/input/input1147 [ 647.026522] gfs2: not a GFS2 filesystem 18:04:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) getgroups(0x7, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee00, 0x0, 0xffffffffffffffff, 0xee01]) r5 = getpgrp(0x0) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000008c0)={0x0, 0x0, 0x0}, &(0x7f0000000900)=0xc) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000940)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000a80)=0xe8) accept4$llc(r0, &(0x7f0000000e80)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000ec0)=0x10, 0x800) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000b80)={0x0, 0x0}) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c80)={0x0, 0x0, 0x0}, &(0x7f0000000cc0)=0xc) sendmsg$netlink(r0, &(0x7f0000000e40)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbff, 0x4}, 0xc, &(0x7f0000000400)=[{&(0x7f0000000100)={0x280, 0x32, 0x100, 0x70bd28, 0x25dfdbfc, "", [@typed={0xf0, 0x68, @binary="269739db2f6b3e6c4f5f1b01e2d15459e47efadd8b9475cce3619c533c563e56bb57441e0f65067f00a97b39e978fefb74a7bb0fc44817ffb3315a90e564be0278dfb682e7073181bdf57fa7a4a350fcd0e86ba6b98bdc6bb57174ce61a4adf0664db085f2720b46d39ce692b8e1cdba2280d754a9b63a76d532c90154072b36509fdc259d328daebf599bd97d83171330f47980962b88b83ae38ecbc95731f2ac00e7fc4d58c9836b8bbe4d38c69bea706226ea68d2400cc7e2e94b71ed3b13dadf66594aa8682c901d84f2784f1d093935ce36918ce4ef2fbabd31f9c7dec75b1229c63131c40f0b8a"}, @nested={0x180, 0x5a, [@typed={0xdc, 0x45, @binary="38de99a92b3673026c2efb438f07799d49a5e73a122297837486959d49f95749974a0ca49672d5a05a8243b47522832709488de24586f88e1987627d4363ab1cf3d1ad2845ec18469614268008772e37db802f36e6583732d98f4eeecbdb656e192702276d4d15501e3d698f449c30342f7017ecf6f0cd47aed2029ae56c0fb44520a7a77a2d4b3a3321e7c09d62b716b1ed17dae01076ab791ae50032caf1691c1d400a8fda0822bee7c7dfbab6027ad3171e691509c3be3069df0107fb6e6c966ceb44c6059bc88a923149e984aefd2184bd8fca98"}, @generic="55c3a5b18d9824bfd83040af36c35af6645ead66993e9280c427cc6fa0628ee6a7989ec26e51dfc9d6ac1c4bbbb13f474a74f85cb4faee9476eab20efd459c97992b57b87e7fdea6e0442e3926ffcfa20f2f092217ab2b90325365bb53819e8ac4c3b88565a3c4d4e91d98e0ec82e5c2344a7b4afcf4ce0b5822d1882ce5403ba7b02ba28c1b3d220118681116c3759f29ee6af0adadb9c7fd", @generic="f8e28b1d02"]}]}, 0x280}, {&(0x7f00000003c0)={0x18, 0x2f, 0x220, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x8, 0x16, @pid=r1}]}, 0x18}], 0x2, &(0x7f0000000d00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x128, 0x5}, 0x4008081) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)) 18:04:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf4, 0x0, 0x0, 0x0) 18:04:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) getsockname$unix(r0, &(0x7f0000000b80), &(0x7f0000000000)=0x6e) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656b75726974792e766574683100f6ff75354492effefc60"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 647.202305] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x102, 0x0, 0x0, 0x0) 18:04:39 executing program 2: clock_nanosleep(0x2, 0x0, &(0x7f00000007c0)={0x77359400}, 0x0) r0 = gettid() clock_nanosleep(0x2, 0x1, &(0x7f00000000c0)={0x77359400}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_nanosleep(0x2, 0xb8ef9e4c5c28237b, &(0x7f0000000000)={0x77359400}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x7fff, 0x4) tkill(r0, 0x1000000000014) [ 647.342235] input: syz1 as /devices/virtual/input/input1148 18:04:39 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f00000001c0)) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97905006d7a55434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 647.384424] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiterfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x190, 0x0, 0x0, 0x0) [ 647.528156] input: syz1 as /devices/virtual/input/input1149 18:04:39 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000340)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, @bcast, @netrom={'nr', 0x0}, 0x1, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000280)=""/68) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1e0, 0x0, 0x0, 0x0) 18:04:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='hsr0\x00', 0x267) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000000), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:39 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xc1, 0x101003) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1fc, 0x0, 0x0, 0x0) [ 647.790663] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 647.837799] input: syz1 as /devices/virtual/input/input1150 [ 647.917861] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x201, 0x0, 0x0, 0x0) 18:04:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiuerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 647.993155] input: syz1 as /devices/virtual/input/input1151 18:04:40 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x7152, 0x100000000, 0x1000, 0x0, 0x8b0}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r3, &(0x7f0000000100)={0x831b7da1ea34150}) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x100013, r2, 0x0) 18:04:40 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) r2 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x6, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0xfffffffffffffff9, 0x40000) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r3, r4}) tgkill(r0, r1, 0x15) r5 = socket(0x40000000015, 0x6, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r6, 0x5606, 0x6) accept4$inet(r5, 0x0, &(0x7f0000000040), 0x800) getsockopt(r5, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r8, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r7, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r10 = socket$inet6(0xa, 0x4, 0xfffffffffffffffc) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r11 = dup(r5) bind$inet6(r10, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r10, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r12 = dup2(r11, r9) write$binfmt_misc(r12, &(0x7f0000000640)=ANY=[@ANYBLOB="73797a27a3c4305e3761f3040000000000000033434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad85686bcc4ce59941e9efd575948fd054f12636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe34a532f93d03be43e16b7ea6c918532068ed9ced88b62fd90a7b6a168e02d132760442bb69abf45cd08c21ff1504e7a7d8e8524a5bfb3fcf"], 0xa9) ioctl$VIDIOC_G_STD(r6, 0x80085617, &(0x7f00000001c0)=0x0) ioctl$VIDIOC_S_STD(r6, 0x40085618, &(0x7f0000000280)=r13) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2d4, 0x0, 0x0, 0x0) 18:04:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792eb76574683100000000ffffff1f00f000"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reixerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 648.401301] input: syz1 as /devices/virtual/input/input1152 18:04:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2f8, 0x0, 0x0, 0x0) [ 648.513080] input: syz1 as /devices/virtual/input/input1153 18:04:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0x243}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x0, 0x0, [0x2, 0x0, 0x1, 0x6, 0x57, 0x8, 0x10000, 0x3]}) prctl$PR_GET_NO_NEW_PRIVS(0x27) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x12d040, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000240)=[0xfffffffffffff001, 0x6]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x0, 0x0, @ioapic={0x6000, 0x0, 0xffffffffffffffff}}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f00000001c0)=0x9) [ 648.555670] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{0x5, 0x0, 0x0, 0x106}, 'syz1\x00', 0x40000000000}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="73656375726974792e76657468c47d03c87f7d9d8da87c264554d73100000000ffffffff00f000765ccd3574f7af99e1bc7d97b9fadd407c172126e0f803f0bc5275ad566ed4a9599ceb012bc94dae6ef632f3"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2fc, 0x0, 0x0, 0x0) 18:04:40 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) write$P9_RXATTRWALK(r3, &(0x7f00000001c0)={0xf, 0x1f, 0x1, 0xffffffffffffff2c}, 0xf) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiyerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, 0x0, 0x0, 0x0) [ 648.856332] input: syz1 as /devices/virtual/input/input1154 [ 648.964453] input: syz1 as /devices/virtual/input/input1155 [ 648.970968] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x394, 0x0, 0x0, 0x0) 18:04:40 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2, 0x80) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000002c0)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r3, 0x15) r4 = socket(0x40000000015, 0x805, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r5, 0x5606, 0x6) accept4$inet(r4, 0x0, &(0x7f0000000040), 0x800) getsockopt(r4, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(r2, 0xfffffffffffffca3, &(0x7f00000000c0)=0x9) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r7, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r9 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r10 = dup(r9) bind$inet6(r9, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r9, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r11 = dup2(r10, r8) write$binfmt_misc(r11, &(0x7f0000000640)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf2641c2b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c965151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) write$P9_RAUTH(r11, &(0x7f00000001c0)={0x14, 0x67, 0x2, {0x6, 0x0, 0x6}}, 0x14) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:40 executing program 2: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x20, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0x7}, 0x3c0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file1\x00') 18:04:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 649.192467] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3c6, 0x0, 0x0, 0x0) 18:04:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 649.268197] input: syz1 as /devices/virtual/input/input1156 18:04:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reizerfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f5, 0x0, 0x0, 0x0) 18:04:41 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) getpeername$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000b40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000040}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)=@ipv6_newroute={0x40, 0x18, 0x200, 0x70bd2d, 0x25dfdbfd, {0xa, 0x80, 0x14, 0x5, 0xfe, 0x2, 0xc8, 0xe, 0x2200}, [@RTA_OIF={0x8, 0x4, r5}, @RTA_GATEWAY={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @RTA_PRIORITY={0x8, 0x6, 0x3}]}, 0x40}}, 0x400c810) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$rxrpc(r2, &(0x7f0000000640)="19250d2b03374898755f906180c830a6598dc0eff3d748ef2243a1a021caa99dcd81b020bccadd2b77dc90e337b248ec5ef3d430629567880acbb1ce234ca863606a5fb33d1d019cc332269f40f35c34506696accad70dd2c42f2ef84c756083c7b636f899be326f2cdcece1ad47f2ce87fbb16fcddef86a71896a8b791c0694ecfe11fc581f0db3dc9635e2986938454a8d8ee5", 0x94, 0x4000804, 0x0, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7, 0x7b, 0x1}, 0x7) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000b80)={0x7b, 0x0, [0x5da, 0xb68, 0xb9f0, 0x1]}) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 649.560548] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3fc, 0x0, 0x0, 0x0) [ 649.663883] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 649.757512] input: syz1 as /devices/virtual/input/input1158 18:04:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4, 0x0, @mcast1, 0x1b3}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000380)=""/170, 0xaa}], 0x1}, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000000c0)=""/83) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 18:04:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) 18:04:41 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f00000001c0)={0x4, 0x6}) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reis\nrfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 649.946175] input: syz1 as /devices/virtual/input/input1159 18:04:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600, 0x0, 0x0, 0x0) 18:04:41 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x13) ioctl(r0, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/ne\x01/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000000c0)=0x101) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000240), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x203f, &(0x7f0000000140)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf200000000000000700000008ffffffad0301000000000095000000000000006916000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:04:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 650.098355] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, 0x0, 0x0, 0x0) [ 650.238597] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 650.291294] input: syz1 as /devices/virtual/input/input1160 18:04:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x101000) ioctl$VT_WAITACTIVE(r1, 0x5607) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x6}}, 0xe) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, 0xfffffffffffffffe) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0xfffffffffffffffa, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0x2f60, 0x43a8f3dd, 0xdb2, 0xfffffffffffffff7, 0xfff, 0x68, 0x6, 0xffffffff, 0x1, 0x1, 0x31}}) 18:04:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x900, 0x0, 0x0, 0x0) 18:04:42 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000280)={0x45, 0x6, 0x0, {0xffffffffffffffff, 0x5, 0x1c, 0x0, 'ppp1securityvboxnet1!+vmnet0'}}, 0x45) r6 = fcntl$dupfd(r4, 0x0, r3) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r7, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(r8, 0x40d, &(0x7f00000001c0)) r9 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r10 = dup(r9) bind$inet6(r9, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r9, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x7c) r11 = dup2(r10, r8) write$binfmt_misc(r11, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 650.486151] input: syz1 as /devices/virtual/input/input1161 18:04:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reis%rfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x101000) ioctl$VT_WAITACTIVE(r1, 0x5607) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x6}}, 0xe) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, 0xfffffffffffffffe) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0xfffffffffffffffa, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0x2f60, 0x43a8f3dd, 0xdb2, 0xfffffffffffffff7, 0xfff, 0x68, 0x6, 0xffffffff, 0x1, 0x1, 0x31}}) 18:04:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, 0x0) [ 650.622931] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0xf, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="736563755c1b931e00000000683100000000ffffffffffef00"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x101000) ioctl$VT_WAITACTIVE(r1, 0x5607) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x6}}, 0xe) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, 0xfffffffffffffffe) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0xfffffffffffffffa, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0x2f60, 0x43a8f3dd, 0xdb2, 0xfffffffffffffff7, 0xfff, 0x68, 0x6, 0xffffffff, 0x1, 0x1, 0x31}}) 18:04:42 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$KVM_SET_GUEST_DEBUG(r8, 0x4048ae9b, &(0x7f0000000280)={0x40001, 0x0, [0x200, 0x2, 0x6, 0xbbf, 0x6f9a, 0x6, 0xa2, 0x10000]}) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, 0x0) [ 650.777418] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 650.796607] input: syz1 as /devices/virtual/input/input1162 18:04:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x101000) ioctl$VT_WAITACTIVE(r1, 0x5607) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x6}}, 0xe) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, 0xfffffffffffffffe) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0xfffffffffffffffa, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0x2f60, 0x43a8f3dd, 0xdb2, 0xfffffffffffffff7, 0xfff, 0x68, 0x6, 0xffffffff, 0x1, 0x1, 0x31}}) [ 650.855461] input: syz1 as /devices/virtual/input/input1163 18:04:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x2000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, 0x0) 18:04:42 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2ca}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x920, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="223bf5f4355bb2d992b59e139e01b5aea8eef933d64799e101326e8214728aa5b62f1e2f78ffd7b7afc5202aefd1f082a1ac6ce2bb1f8268a1aced851fc337ec876fdf103dd2328bf6cedf4d218d2d79c05cdfb4ad2a44b27ba5ce9ed263983582c93d449e0d259cae"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiskrfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:42 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f00000001c0)='/dev/vcs#\x00') fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="73797a305e3761f3baf7a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33ceadfee6b5977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6e8ceb6ad7ad779a69f0d1096eff059545283bf1221de21c7164fb7805c22897a5dc64420073011a96d130f54841b45ba7f67c20161915ba746c188ab10d3f3658b00195a758900fdd220680808384beac17ad83cd146658b68424622d0eb6f"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, 0x0) [ 651.226729] input: syz1 as /devices/virtual/input/input1164 [ 651.253955] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf18, 0x0, 0x0, 0x0) 18:04:43 executing program 2: [ 651.366483] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, 0x0) 18:04:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) r2 = openat(r0, &(0x7f0000001100)='./file0\x00', 0x400, 0x19) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001080)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="b50bcfba2316b3ad33ee9c", @ANYRES32=r3, @ANYBLOB="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"], 0x3bc}}, 0x8884) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="7365637574683100000000ffffffffffef004bb44b83f04fe45c1b9a977d5f6edf7adf76be5a0f899a6145319cb874379031764b112efc4f90c7daaabcdce32bd09144d7ead83043864e00000000000000"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000001140)={0x0, 0x2, 0x30, 0x6, 0x1}, &(0x7f0000001180)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000011c0)={r4, 0x0, 0x803, 0x2, 0x10000, 0xffffffff}, 0x14) 18:04:43 executing program 2: 18:04:43 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0xc, &(0x7f0000000240)) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000001c0)='bridge_slave_0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x2400, 0x0) r10 = dup2(r9, r6) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x180f, 0x0, 0x0, 0x0) [ 651.655825] input: syz1 as /devices/virtual/input/input1166 18:04:43 executing program 2: [ 651.705366] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reise\nfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, 0x0) 18:04:43 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x249}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 651.832285] input: syz1 as /devices/virtual/input/input1167 [ 651.965366] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 18:04:43 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x3a2}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, 0x0) 18:04:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:43 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x1, 0x2, &(0x7f00000002c0)=""/13, &(0x7f00000001c0)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xd4a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000000)=0x800) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 652.188707] input: syz1 as /devices/virtual/input/input1168 18:04:44 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x26d}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, 0x0) 18:04:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reise%fs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:44 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) ioctl$BLKRAGET(r7, 0x1263, &(0x7f00000001c0)) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r6) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:44 executing program 2: 18:04:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, 0x0) [ 652.387098] input: syz1 as /devices/virtual/input/input1169 [ 652.433929] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:44 executing program 2: [ 652.518465] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) r3 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000004, 0x10, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000000)={r3}) 18:04:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00, 0x0, 0x0, 0x0) 18:04:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:44 executing program 2: [ 652.709359] input: syz1 as /devices/virtual/input/input1170 18:04:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) 18:04:44 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xbc, 0x8, {"a5e7bb9c3986fdb2b8e2ab7bcd12c56dd26c46c830e4b06acfa173fbfd165085b689a2fc04551f9418bcac5126ab9a4d10a65769b5f8e81686c738a8dcb0e8df221d571159cbe385254f29e93705e6b601ddc3611e1cb5442bfed4757634b7882e480ed87e7a455396aa35c94b13473f71ef5f6cfd147a561483b9043c9d97106fc412588d5c0fe4707aa4001e9c0dcae95be5ff08ce5187031fb6ccb8d9dbda66"}}, {0x0, "8a1a5fda11f66179861527ce6a2580f7d25b0529358336163750d15bab628b02e43b91d53586bb870e0470a692b6cfefc36f05026afd56710400cb3631e3e83ad059b9696691ab4e5175ac527fad23bbd4f7162d9d610b39ec7389a5f28dc370e5e09013d21f42082438f2a98d4f20be3543d8930e48a7d2"}}, &(0x7f00000001c0)=""/32, 0x136, 0x20, 0x1}, 0x20) r1 = socket$pppoe(0x18, 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000002c0)) tgkill(r0, r2, 0x15) r3 = socket(0x40000000015, 0x805, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) accept4$inet(r3, 0x0, &(0x7f0000000040), 0x800) getsockopt(r3, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:44 executing program 2: 18:04:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiser\ns\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 652.843605] input: syz1 as /devices/virtual/input/input1171 18:04:44 executing program 2: 18:04:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) 18:04:44 executing program 0: pipe(&(0x7f0000000e80)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000ec0)={0x0, 0x63, "b2253a2882081c5e87d8257c81ba528134690d183a3494ce6934f88b6fd12e0b072d2602e6a68f6937c7193a12bb03c64053349839a5abca4bba0c734a40b26e621ee65d0d1a0471de17da3b3f4332dc46387ed633ba5189fc8cf1985a4fad1a157228"}, &(0x7f0000000f40)=0x6b) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000f80)={r1, 0x5}, 0x8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000fc0)={{{@in=@empty, @in=@multicast1}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000010c0)=0xe8) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r4) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000e40)={0x0, 0x1, 0x40, 0x10000}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="54010000", @ANYRES16=r5, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x4000085}, 0x4048014) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 652.974029] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:44 executing program 2: 18:04:44 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) getsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f00000001c0)=0x80000001, &(0x7f0000000280)=0x4) write$binfmt_misc(r9, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, 0x0) [ 653.140224] input: syz1 as /devices/virtual/input/input1172 18:04:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:45 executing program 2: 18:04:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiser%s\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 653.246628] input: syz1 as /devices/virtual/input/input1173 18:04:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, 0x0) 18:04:45 executing program 2: 18:04:45 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x8000000080f, 0x3) r5 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r10 = dup(r2) bind$inet6(r9, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r9, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r8, 0x4058534c, &(0x7f0000000280)={0x7, 0x7fffffff, 0x10001, 0xffffffffffffffff, 0x5}) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r11 = dup2(r10, r7) read(r5, &(0x7f0000000640)=""/159, 0x9f) write$binfmt_misc(r11, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) 18:04:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/sequencer\x00', 0x408180, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000ec0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000d00)=@deltaction={0x174, 0x31, 0x808, 0x70bd2c, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x8c, 0x1, [{0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x81af}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x1a, @TCA_ACT_INDEX={0x8}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}, {0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffffffffff5c}}, {0x10, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0xa, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffffffffff7}}, {0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @TCA_ACT_TAB={0x80, 0x1, [{0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0xa, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x18, 0xe, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x100000001}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x40054}, 0x8000) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x1) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000b80)={r1, 0x0, 0x3, 0x0, 0x40}) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r4) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:45 executing program 2: 18:04:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) [ 653.537234] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:45 executing program 2: [ 653.601828] input: syz1 as /devices/virtual/input/input1174 18:04:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) [ 653.698351] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiser.s\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 653.739751] input: syz1 as /devices/virtual/input/input1175 18:04:45 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, 0x0) 18:04:45 executing program 2: 18:04:45 executing program 2: 18:04:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) 18:04:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000b80)='mV3\x96)\xe0\xcf\xea`\x10\xdf^y\x9c\xd0\x10\x84\xfb\xb7\xc5\xf3\xd3\xb6X\x04\xcb\x03\x88\vz\xfa\xf0\x1ed\xde\xa5\x9f\x95K6\x17L\xdd\xb3\x84\xafY\x05\x18\xb7\xa03t\x88\xa0J\xdc`\xea(!\xf3\x98\x14\xe3\xd4\x90\x80\xcc;u\x14\x90S\x05\xd2I\x15t\x8c\xe0\x93\x8bk\x04\x9f\x82\xde)\xf4\xd4S\xa2L\xfc\x05\x87L\xb1\xce}\xe1\x00\x00\x00\x00\x00\x00\x04\x00\xc6A\x1c\x89', 0x200000000000002) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:45 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) write$binfmt_aout(r3, &(0x7f0000000640)={{0xcc, 0x4, 0x8001, 0x148, 0x9f, 0x6d, 0x176, 0x40c9}, "ba003b5513f1fb443dbcfe1a2f6f5bab95959dea1a68349cfa48c6aa6adb9a46fc8609b4d093d5c0257a42a0c278beb4e4f5428d1b71465b3f05b0576066faee2c85d1a903905d890d7425a7026e42039841200a0f32029b183f1bab628908e3aa58c6769c307bb080f64db0501a4df443b3db11b8fefb313b7ea330d34521a0385430eca0485c02d2da952d1d824247db5ef6f7906f9f94ebe5d175f7a65c6e12e86a64cd068bde576df55936af1b6e0a58ecf4d8755521bbd2d360b522005189f1a2d28953dc3d7a1665741091b019320eca425770fd68407edc34cd49386986fe932b1690b14e84fef7cfaf95b64f", [[], [], [], [], [], []]}, 0x710) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 653.983344] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9001, 0x0, 0x0, 0x0) 18:04:45 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a68c75a83e1dbe1377c477e5f511e8b6446dcd51e4c28a3a14978de401b200cccc6467579bf4dc7f33c04e280a57445ed0eb1162f88c7af97418bcaad410b2d82b83aed5c1ff2950e70d45471f172f9f7ff6e5daf0220a1c00e92c1e43da6f8c44f6208ea676bc688df030ef99d335b892c4585d5de76d7274018b0f434916fd2678a22f12d0de78dfec70d3eaec8c182f88068e62af0860482789ddb2fb14e8a627ce2ebe2a793df6f344da0695fd896bfaddd8e573ca5bc8aa88a5584e770ad17880a9496f5a6cb1d1054d5542e475aa661b90248a2273170d17d3d765fb54b96ddea8f31257d4aa50988ba4cf0f6d63dd6ddb38a3e4ccb7451045a800f3976581c43e0fec5035554c447106389c300f09b978fe9a8e9d7f1e45f437268dc89e72971dc35a9d8d746dc760fb751b3786cee700a7988283b1da35b1ff74d7ac025e7d511eaeba4388407073946a6524b3d25f131ee254edf7d26031d89853911e0db9f7d23ef5f970e9ba363e27800517db8f53068e60e496fa39d9d93885bfd91c95dd48cf1317eac4e74669305a2dde3ed506480a1eabea7c2c188c285453f82d33bc1330467f1ecff0d1487aede3d157c6d7d27b247e3e717435037c91806c57c411268e7b5a709723b68ef1a8faecb6ac852e9a1d623dbd05f7f3b4f1744206d58fe5a5e6ad0f9bff712127c530a85675c731d845d04b2232", 0x41b}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 654.047068] input: syz1 as /devices/virtual/input/input1176 18:04:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiser/s\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 654.107820] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9403, 0x0, 0x0, 0x0) 18:04:46 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x4c9}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:46 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) sched_rr_get_interval(r1, &(0x7f0000000100)) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) r6 = socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r7, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, 0xffffffffffffffff) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de36a94feea7afe15bc545c2b78d2d9fe8697bc4"], 0xa9) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000001c0)=0x2, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x7, 0x10, 0x1, 0x1f}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r10, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r11, 0x3ff}, 0x8) ftruncate(r6, 0x2007fff) ioctl$BINDER_SET_MAX_THREADS(r9, 0x40046205, 0x8) 18:04:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="f93c9b7014d03d658cfc9986bebd20160f27638f11b8f562ed7074cbc8f140aebce8700ca9ddefa9806a523a401a4a4736d616396034951949ea788ec4d97b4562aca1707b24ff19034de91178670548ef52dbbe74ffdc312027f9b26d26bc98b10ec01fe772145ca24e2aef38088c936177abf48eaa4aeba3d2407028987655803cf96bf758e4ec6faf0887b338e99ac1a35ae9aab903a1f5f73de4cc801b7e74b8dc9f669436fea5d9"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7309637572697479fffffff9eb000000000000000000000000"]) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000240)="b3a7e5f8576bd9c134d6d59a1a1dce6c23", 0x11) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa000, 0x0, 0x0, 0x0) 18:04:46 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x3e5}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 654.407831] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 654.461067] input: syz1 as /devices/virtual/input/input1178 18:04:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc603, 0x0, 0x0, 0x0) [ 654.534338] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:46 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x5ac}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:46 executing program 4: syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x828c, 0x400000) r0 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0x3, 0x2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000440)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r1, r2, 0x15) r3 = socket(0x40000000015, 0x805, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) accept4$inet(r3, 0x0, &(0x7f0000000040), 0x800) getsockopt(r3, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 654.584721] input: syz1 as /devices/virtual/input/input1179 18:04:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserks\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:46 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x208}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd402, 0x0, 0x0, 0x0) 18:04:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="000f1134c5c2e9a23d6c7bd3c29ee30e66f688b546bede94092b318b4eb720fb9296a81c0a04b87ab46387d9dda1f9adfbd07bbf1e069eac8170c06effbc750b5ebebdcb9e4e9eab029561f5880585ed5b604561e7917f6e07849536beb03f6af2aa2b0f6df202c31ba3504eec297f331f5ce04ca3afc90cde02ac7fc5a9e69dfcb8090361533b93e8cfd09703445b303bd711a1fe38d729a27d51ab01b4517476104d52b8865a807f3a5836efa8ff"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 654.852303] input: syz1 as /devices/virtual/input/input1180 18:04:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe001, 0x0, 0x0, 0x0) [ 654.897052] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:46 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b21", 0x203}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 654.984517] input: syz1 as /devices/virtual/input/input1181 18:04:46 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) timerfd_gettime(r3, &(0x7f00000001c0)) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97951787d18e6752f5f31f5fac59849d2434bb8a1b9b12d976a7f0000008d87d1272bb00534cdafd30244080fc0fb3381d741e60c000000000000115544d2636b3cea7e9ed07b77045568d60b4c597c7764339fae37075bd973983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b4ab0e58d11029ce1f5896b7eb6000000000000000000606ed7e396e26bba44a0ae299ad614a4a40df66c3644528102d8d2c483402553350bfff98f964d2ecb72a4dd8ba310a4df18b1d933ddb0e4b4e70932749d0f720ef0e568d85991ab2ad97621826c20d823a34be0689e9132f722ee640b666796209f97c1d06f39fe9385704686851cb2b6f9a4d20211c41a4c6fc017083c8d17216d6db2e5730db3aaec70e84f"], 0xa9) fcntl$setpipe(r7, 0x407, 0x4) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) [ 655.104428] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="3d034f045b7273e4b038c031e126228dcf44408975eeadfe2a15"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000cc0)={0x0, @reserved}) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf\n\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:47 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x1c0}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf400, 0x0, 0x0, 0x0) [ 655.257189] input: syz1 as /devices/virtual/input/input1182 18:04:47 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x224}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:47 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x1000, 0x23fe) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r2, r1, 0x10012) r3 = socket(0x40000000015, 0x805, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) accept4$inet(r3, 0x0, &(0x7f0000000040), 0x800) getsockopt(r3, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) set_robust_list(&(0x7f00000002c0)={&(0x7f0000000280)={&(0x7f00000001c0)}, 0x9}, 0x18) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x6d75) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r7, 0x4028af11, &(0x7f0000000b80)={0x3, 0x1, &(0x7f0000000bc0)=""/120, &(0x7f0000000700)=""/8, &(0x7f0000000ac0)=""/191, 0x840000000d000}) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf503, 0x0, 0x0, 0x0) [ 655.487964] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 655.526463] input: syz1 as /devices/virtual/input/input1183 18:04:47 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x4b8}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf802, 0x0, 0x0, 0x0) 18:04:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf#\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:47 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x428}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 655.864836] input: syz1 as /devices/virtual/input/input1184 18:04:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc01, 0x0, 0x0, 0x0) 18:04:47 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="73797a305ed5a3f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb0f833cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b99d40ecd1b442f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d114c79785ba6a8ecb37e1b5c8bbf81e104ad71243a1ed9ce16f93fff8ab6aa63fd2059787f7c840d5d88c7ba039577585b52d8f708b6e22bcd3156ad8e82441f"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:47 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a68c75a83e1dbe1377c477e5f511e8b6446dcd51e4c28a3a14978de401b200cccc6467579bf4dc7f33c04e280a57445ed0eb1162f88c7af97418bcaad410b2d82b83aed5c1ff2950e70d45471f172f9f7ff6e5daf0220a1c00e92c1e43da6f8c44f6208ea676bc688df030ef99d335b892c4585d5de76d7274018b0f434916fd2678a22f12d0de78dfec70d3eaec8c182f88068e62af0860482789ddb2fb14e8a627ce2ebe2a793df6f344da0695fd896bfaddd8e573ca5bc8aa88a5584e770ad17880a9496f5a6cb1d1054d5542e475aa661b90248a2273170d17d3d765fb54b96ddea8f31257d4aa50988ba4cf0f6d63dd6ddb38a3e4ccb7451045a800f3976581c43e0fec5035554c447106389c300f09b978fe9a8e9d7f1e45f437268dc89e72971dc35a9d8d746dc760fb751b3786cee700a7988283b1da35b1ff74d7ac025e7d511eaeba4388407073946a6524b3d25f131ee254edf7d26031d89853911e0db9f7d23ef5f970e9ba363e27800517db8f53068e60e496fa39d9d93885bfd91c95dd48cf1317eac4e74669305a2dde3ed506480a1eabea7c2c188c285453f82d33bc1330467f1ecff0d1487aede3d157c6d7d27b247e3e717435037c91806c57c411268e7b5a709723b68ef1a8faecb6ac852e9a1d623dbd05f7f3b4f1744206d58fe5a5e6ad0f9bff712127c530a85675c731d845d04b223207f218b2110ac6e4fe047a3a49e699786cb67ac4fadaed8746f84a21969c483b006ddadd18c7eda482fd213c2e733a98b8bdc790c936faab382d1b9adecfd922aa5787eb0593a71f3f7ee1720b93f9b5df9ac1e4be8c241098a9ac5d53692863b20d59be0cb1287b9d30ddf6cbb26eb75642c14f97feec5f9eba5d780a90fecebce83ef44d6a7e322a48e30d93a5e52344301e9656abeb7f8d69c3c88730a76ebc571b0985b18c139706725a05b830c34b30bcc8d449dd0724de1e4c46694aed33abb80631d9f1e56c4e8ee4b16f6f610e0839352444c4b521f89401f05cfba66700a5efcf738ee6bf550c13fd4fae91efe37fcd20fc4895373fee062ed59878b26d360f6b58778534f2aa153cc490fd389defa21d0be89eca72ced602f36f3fd1ba2d8596725b97d0b652b7d268a2969042514f877ee37dc80c2094533c8a0e701eb91c4a3614a39f4b85f0442e6764c67966f54ee2018358e263ae2951a43e5de08e584a3f51632084fae2b3a0ae9a6aeaaa89ce156ba17938be7b", 0x597}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 655.969954] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:47 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$VIDIOC_QUERYMENU(r9, 0xc02c5625, &(0x7f00000001c0)={0x400, 0x3, @name="9fee9f9c5f2dff0dcb7d7ae0d9d743a756f3046f96d42c23afbd71a6dc0c92a0"}) 18:04:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc02, 0x0, 0x0, 0x0) [ 656.076836] input: syz1 as /devices/virtual/input/input1185 [ 656.104861] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:48 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x22a}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000bc0)=0x101) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375460e00002e76657453310020009bafffffefffef00"]) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000240)={0x0, 0x80000, r3}) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000b80)={r4, r5, 0x5}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf%\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc03, 0x0, 0x0, 0x0) 18:04:48 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2b1}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 656.403752] input: syz1 as /devices/virtual/input/input1186 18:04:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, 0x0) 18:04:48 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) bind$x25(r8, &(0x7f00000001c0)={0x9, @remote={[], 0x0}}, 0x12) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:48 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x4c7}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 656.590156] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 656.629460] input: syz1 as /devices/virtual/input/input1187 18:04:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, 0x0) 18:04:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:48 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x3d1}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000240)='keyringuser\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x5, 0x9}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf*\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0, 0x0, 0x0) 18:04:48 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) r0 = socket(0x40000000015, 0x805, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r1, 0x5606, 0x6) accept4$inet(r0, 0x0, &(0x7f0000000040), 0x800) getsockopt(r0, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r3, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r6 = dup(r5) bind$inet6(r5, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r6, &(0x7f0000000280)="3e1d9d8c13ea159d062147c1a129191a96ba1c56b20752a239a88e2000e61fa05ea105cb1ebdfeeee2eb16ac2351a11e7e37f40c078eb1ad68eae0872145e830250b2e87e3049717cfa5db553e45ca11ffd79e2ae160f0a0e19412f35a69ee36610ee3691a5ce13251057b911763c03346cc059390"}, 0x10) sendto$inet6(r5, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = dup2(r6, r4) write$binfmt_misc(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6080000005544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f5819de5b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fed697bc4fe4c4ab0e58d11029ce16b7e33a554b8532f52b13cb0d3f0eace983559817c4d962979a36fc72b35b62ca8dbddba71d7201c6b1c7a27f725faa91644b681e82a7a4989c16c7704b39d66aa45ebe1d447dc"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:48 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x202}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 657.021045] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 657.039571] input: syz1 as /devices/virtual/input/input1188 18:04:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000, 0x0, 0x0, 0x0) [ 657.153008] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 657.199646] input: syz1 as /devices/virtual/input/input1189 18:04:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) 18:04:49 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a68c75a83e1dbe1377c477e5f511e8b6446dcd51e4c28a3a14978de401b200cccc6467579bf4dc7f33c04e280a57445ed0eb1162f88c7af97418bcaad410b2d82b83aed5c1ff2950e70d45471f172f9f7ff6e5daf0220a1c00e92c1e43da6f8c44f6208ea676bc688df030ef99d335b892c4585d5de76d7274018b0f434916fd2678a22f12d0de78dfec70d3eaec8c182f88068e62af0860482789ddb2fb14e8a627ce2ebe2a793df6f344da0695fd896bfaddd8e573ca5bc8aa88a5584e770ad17880a9496f5a6cb1d1054d5542e475aa661b90248a2273170d17d3d765fb54b96ddea8f31257d4aa50988ba4cf0f6d63dd6ddb38a3e4ccb7451045a800f3976581c43e0fec5035554c447106389c300f09b978fe9a8e9d7f1e45f437268dc89e72971dc35a9d8d746dc760fb751b3786cee700a7988283b1da35b1ff74d7ac025e7d511eaeba4388407073946a6524b3d25f131ee254edf7d26031d89853911e0db9f7d23ef5f970e9ba363e27800517db8f53068e60e496fa39d9d93885bfd91c95dd48cf1317eac4e74669305a2dde3ed506480a1eabea7c2c188c285453f82d33bc1330467f1ecff0d1487aede3d157c6d7d27b247e3e717435037c91806c57c411268e7b5a709723b68ef1a8faecb6ac852e9a1d623dbd05f7f3b4f1744206d58fe5a5e6ad0f9bff712127c530a85675c731d845d04b223207f218b2110ac6e4fe047a3a49e699786cb67ac4fadaed8746f84a21969c483b006ddadd18c7eda482fd213c2e733a98b8bdc790c936faab382d1b9adecfd922aa5787eb0593a71f3f7ee1720b93f9b5df9ac1e4be8c241098a9ac5d53692863b20d59be0cb1287b9d30ddf6cbb26eb75642c14f97feec5f9eba5d780a90fecebce83ef44d6a7e322a48e30d93a5e52344301e9656abeb7f8d69c3c88730a76ebc571b0985b18c139706725a05b830c34b30bcc8d449dd0724de1e4c46694aed33abb80631d9f1e56c4e8ee4b16f6f610e0839352444c4b521f89401f05cfba66700a5efcf738ee6bf550c13fd4fae91efe37fcd20fc4895373fee062ed59878b26d360f6b58778534f2aa153cc490fd389defa21d0be89eca72ced602f36f3fd1ba2d8596725b97d0b652b7d268a2969042514f877ee37dc80c2094533c8a0e701eb91c4a3614a39f4b85f0442e6764c67966f54ee2018358e263ae2951a43e5de0", 0x57d}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:49 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) getsockopt$inet6_buf(r6, 0x29, 0x1c, &(0x7f0000000640)=""/152, &(0x7f00000001c0)=0x98) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) r3 = socket$inet(0x2, 0x7, 0x85) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x8dd}, &(0x7f0000000b80)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000bc0)={r4, 0x3}, &(0x7f0000000cc0)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 18:04:49 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x4cc}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf+\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2010000, 0x0, 0x0, 0x0) [ 657.526662] input: syz1 as /devices/virtual/input/input1190 18:04:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) [ 657.591327] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:49 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2c5}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:49 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x6, 0x2000) fcntl$getownex(r1, 0x10, &(0x7f0000000440)={0x0, 0x0}) tgkill(r0, r2, 0x15) r3 = socket(0x40000000015, 0x805, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) r5 = accept4$inet(r3, 0x0, &(0x7f0000000040), 0x800) getsockopt(r3, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f00000002c0)={r7, 0xff}, 0x8) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r8, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r12 = dup(r11) bind$inet6(r11, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r11, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r13 = dup2(r12, r9) write$binfmt_misc(r13, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$BLKGETSIZE(r10, 0x1260, &(0x7f0000000340)) [ 657.739491] input: syz1 as /devices/virtual/input/input1191 [ 657.745702] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 18:04:49 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x3d0}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x10, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000000)={0x71300000000000, 0x80808, "b0e0c357aa3bb3f9f3e44a386add7b4823bdd96a172c88db", {0x7, 0x6d1}, 0xd4}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) 18:04:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf-\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:49 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x592}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:49 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000640)={0x83, ""/131}) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 658.093207] input: syz1 as /devices/virtual/input/input1192 18:04:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) 18:04:50 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x52a}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) [ 658.270019] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 658.372713] input: syz1 as /devices/virtual/input/input1193 18:04:50 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x5e3}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:50 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f00000001c0)={0x1, 0x2, 0x9}) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 658.459245] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, 0x0) 18:04:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000cc0)={{{@in=@empty}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf.\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) 18:04:50 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) ioctl$FS_IOC_SETFSLABEL(r6, 0x41009432, &(0x7f0000000640)="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") sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:50 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2bf}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 658.736206] input: syz1 as /devices/virtual/input/input1194 18:04:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, 0x0) [ 658.841531] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:50 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674", 0x1bf}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 658.918325] input: syz1 as /devices/virtual/input/input1195 18:04:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserf0\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 658.971284] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, 0x0) 18:04:50 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x1ee}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73616375726974792e766574683100000000ffffffffffef00"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:51 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) write$FUSE_LSEEK(r3, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x3, {0x6}}, 0x18) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000280)={0xb800000000000000, 0x4, 0x7, 0x1, 0x1d}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, 0x0) 18:04:51 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2ea}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 659.293233] input: syz1 as /devices/virtual/input/input1196 18:04:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) 18:04:51 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) ioctl$SIOCX25GDTEFACILITIES(r3, 0x89ea, &(0x7f00000001c0)) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:51 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a68c75a83e1dbe1377c477e5f511e8b6446dcd51e4c28a3a14978de401b200cccc6467579bf4dc7f33c04e280a57445ed0eb1162f88c7af97418bcaad410b2d82b83aed5c1ff2950e70d45471f172f9f7ff6e5daf0220a1c00e92c1e43da6f8c44f6208ea676bc688df030ef99d335b892c4585d5de76d7274018b0f434916fd2678a22f12d0de78dfec70d3eaec8c182f88068e62af", 0x2b6}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfK\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 659.490494] input: syz1 as /devices/virtual/input/input1197 [ 659.498339] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x180f0000, 0x0, 0x0, 0x0) 18:04:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r1, r0, 0x0, 0x1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="b6123e82dc59a0c6350d8f24641f6688f961aaece14962ef9a458a4fc838"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x1c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:51 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x289}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 659.680859] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 18:04:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 18:04:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:51 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000001c0)) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 659.800171] input: syz1 as /devices/virtual/input/input1198 18:04:51 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2bb}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) 18:04:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180), 0x4) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000b80)={{0x0, 0x0, 0xffff}, 'syz1\x00'}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000240)=0x8, 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x7ffffffb, &(0x7f0000000000)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726934792e74683100000000ffffffffffef000000"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfX\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) [ 660.198480] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:52 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2ad}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:52 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0)=0xffffffffffffff80, 0x4) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d4ee98a502770589508827bd77a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 660.241123] input: syz1 as /devices/virtual/input/input1199 18:04:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x23000000, 0x0, 0x0, 0x0) 18:04:52 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x5b1}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x0, 0x0) 18:04:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x180f000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792e766574683100000000ffffffffff8a76"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:52 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) fgetxattr(r4, &(0x7f00000001c0)=@random={'os2.', ']\x00'}, &(0x7f0000000280)=""/13, 0xd) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:52 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000100)=""/67, 0x43) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="b6a9937634074ddc8896"]], 0x1, 0x0, 0x0) 18:04:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) [ 660.599096] input: syz1 as /devices/virtual/input/input1201 18:04:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfa\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) [ 660.715725] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 660.744857] input: syz1 as /devices/virtual/input/input1202 18:04:52 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) socket$inet(0x2, 0xa, 0x0) semget(0x0, 0x2, 0x100) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6928f52b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce1"], 0xa9) ptrace$setregs(0xd, r1, 0x6, &(0x7f0000000640)="cf4107f0944d82d9c76d3ce341d755a59617f51b06d1bbbad5354f866ebdb8c62bdf971ac5fefa6ca5fe6df4ee13b8ba9aec4b68d197a851f5fdd7bc381d171ce0fd478334e592b43986463d62525b2a6bb4d606b62927ab615de465850369235f7995e434ca6f5b0936fa704f1fbb0cacee97c2ea55e164d5bf658b8e7a9cb75a2f5b18292f12162a9a177b4c2d2c9ed375b82dc0909a1fef8219aaad5d16cd99d7da51c583a99fbb90ba0cb8b3439bce7fbbafd8603584a8ea4ea0727c0bf3c257bc6f31974663600956a14b155e9210aa184e5e89") ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) [ 660.891756] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6tnl0\x00', 0x10) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="c9f3f5298cfb2895ef76d027303e46d112101c1ad6dafe83473c1a20e88a485b72e5"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x75) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) [ 661.130335] input: syz1 as /devices/virtual/input/input1203 18:04:53 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x800, 0x200) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) 18:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfb\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 661.261092] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 661.299248] input: syz1 as /devices/virtual/input/input1204 [ 661.426153] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:53 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x5cf}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:53 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) sched_getparam(r1, &(0x7f00000001c0)) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) 18:04:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 661.559164] input: syz1 as /devices/virtual/input/input1205 18:04:53 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x3ac}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) 18:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfc\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:53 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0xc0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x3, 0x30}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in={{0x2, 0x4e23, @local}}, [0x6, 0x7, 0x5, 0xc1, 0x3, 0x1ff, 0x7, 0x200, 0x3, 0x67, 0x8000, 0x6, 0x3, 0x6, 0x80]}, &(0x7f0000000340)=0x100) tgkill(r0, r1, 0x15) r4 = socket(0x40000000015, 0x805, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r5, 0x5606, 0x6) accept4$inet(r4, 0x0, &(0x7f0000000040), 0x800) getsockopt(r4, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) r7 = socket$inet6(0xa, 0x807, 0x80000000) r8 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r9, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r11 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r12 = dup(r11) bind$inet6(r11, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r11, &(0x7f0000000340), 0xfffffffffffffefa, 0x20000008, 0x0, 0xfffffffffffffcfb) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={'hwsim0\x00', {0x2, 0x4e24, @local}}) r13 = dup2(r12, r10) write$binfmt_misc(r8, &(0x7f0000000900)=ANY=[@ANYRESHEX=r5, @ANYPTR=&(0x7f0000000980)=ANY=[@ANYRES32=r7, @ANYRES64, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRESDEC=r9], @ANYRESHEX=r2, @ANYBLOB="ba4a394c34df17e9491d0c121a75ed3a4edb832c6d2432e5fbac6ba5ae8bb69de7aa677c0e7dd990367a61bd1f2185d2bb891e725aeb0c4e9c61bb10921df15772aaf1cd7f7a2b4a7e543a5a48d4878a0e64b7fd1a252b3733c039c1214e077d1088976b4e542e6dda7e2d4e1a54c4b992a997b6bb1521c29367f4a9c4482309fc6c84061fd946dec40bfa70ddc68b1f9da9d1f468765ce3114a81fd18571340a14e120acd02db69342c802ff91c99ff824b0e8afbc97eac0abaaf00195b3eb7e552a7d439062f2228b6b976df958bcad80d35", @ANYBLOB="baa8a9df47fa7ab689e09ea211a6dc896def51ec08af8a5f573b53e7ef890ef143dd0fd2935c8afd2cbe7a0ccf735f5558058e2de812e81ce45013cc7f3ae33267e6fe8bcfadc02b83b966497efa1667cbd62543b0ad0978031ee20d23dc093cb0ab5043ebda73ce0e00664451bb70dbe792fffa4359fa6969ded33876553ce71eabe5e00c7f85d161e5d42c770e6aa4aeaa30b7ad3da3c89312366da5c5b6f6d4ddedf8e37e5f2b42410f3bd30cac150b660b9abbe0749def6f3b58f050a1e2af9e6edf14a96bb55f2f752a122ad8c43c4cf9ed0d0f2dc19e32e3493b24ec0d1a1fb1260ced2e862cc583a19193ec79c0b513"], @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRESDEC=r2], @ANYRESDEC=r13, @ANYRESOCT=r4, @ANYRES32=r4], 0x2b32c309) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:53 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b215157", 0x205}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="1b12b3ae439a989d09a97bde9fa66632e3f938ef368b6a46cf9ec1e097a7ea90ba03b10a"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000240)=0x2dab) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) [ 661.806224] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 661.895898] input: syz1 as /devices/virtual/input/input1207 [ 661.925893] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:53 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x213}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:53 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f00000001c0), 0xfffffeba, 0x4000000, 0x0, 0xd2) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed0797764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 18:04:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 662.101601] input: syz1 as /devices/virtual/input/input1208 18:04:54 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x1e3}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 18:04:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfd\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) io_setup(0x0, &(0x7f0000000000)=0x0) io_cancel(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000cc0)="acfb5d0b02349fe82f92af716cac311c545b558e8f339b40fb649f093e7bb6aa1ce1ae445622fafd26fbc03c588e442ab39c2b527f057901becc6ecfdc66dbd60be947b3dd6a396c251232029d9f6866c19220e1bfae24e0a07ff24a327b044c61e6e371a061ee28bb405dea79e86c0d7c9c1c1619806318b706b8b8e3d61aee2c814bd3cfb23d2227d65531a75a9293b6929a7ccd9138908d4a18686a34b54d15b814ba4924889308df51ba0c4edd69667c0324d8920cce37ffa9687e37aa", 0xbf, 0x0, 0x0, 0x0, r1}, &(0x7f0000000b80)) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) fcntl$addseals(r1, 0x409, 0x9) r4 = dup(r3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000d80)={0x524f1fe3, "ba7230d60b83dd741f8d3cb59a2f125fac8eb7a37d78c5597a434e5877a0110e", 0x1, 0x1}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000bc0)=0x800) ioctl$TIOCSCTTY(r4, 0x540e, 0x7b) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 662.356173] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x90010000, 0x0, 0x0, 0x0) [ 662.429330] input: syz1 as /devices/virtual/input/input1209 18:04:54 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x5d1}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:54 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x9, 0x400000400002) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r3, 0x8818564c, &(0x7f0000000640)) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7036d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b23cea7e9ed07977047b6bac5568d60b4c597c776433acae37075bca73982fd7482b9134aa77d477a9242f58195b000000000000040110b6a55cf3dac16d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d91029ce1173cb6"], 0x30f) ftruncate(0xffffffffffffffff, 0x2007fff) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) [ 662.471711] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x2400000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 662.555062] input: syz1 as /devices/virtual/input/input1210 18:04:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x94030000, 0x0, 0x0, 0x0) 18:04:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={r3, 0x80000, r2}) 18:04:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfh\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa0000000, 0x0, 0x0, 0x0) 18:04:54 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd3c50450da3e8b5bb8ce1a5475cc847c0244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60bcc597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9f235b"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 662.912888] input: syz1 as /devices/virtual/input/input1211 [ 662.924895] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:54 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2b4}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) [ 663.068663] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 663.080937] input: syz1 as /devices/virtual/input/input1212 18:04:55 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x215}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc6030000, 0x0, 0x0, 0x0) 18:04:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x3d00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0x4, {{0x2, 0x0, @multicast2}}}, 0x88) r3 = dup(r1) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000540)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r5, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r5) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:55 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) 18:04:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd4020000, 0x0, 0x0, 0x0) 18:04:55 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x1c5}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfi\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 663.390961] input: syz1 as /devices/virtual/input/input1213 [ 663.477910] input: syz1 as /devices/virtual/input/input1214 [ 663.583805] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:55 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2c1}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000001600)) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) socket$netlink(0x10, 0x3, 0x7) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000cc0)={@remote={[], 0x3}, 0x7, 'team_slave_1\x00'}) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000b80)={&(0x7f0000000dc0)={0x9c, r3, 0xc04, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x80}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3f}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe0010000, 0x0, 0x0, 0x0) [ 663.724722] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:55 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) read(r3, &(0x7f0000000640)=""/152, 0x98) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f00000001c0)={0x2b, @multicast1, 0x4e23, 0x0, 'dh\x00', 0x20, 0x401, 0x77}, 0x2c) 18:04:55 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a6", 0x221}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 663.836559] input: syz1 as /devices/virtual/input/input1215 18:04:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, 0x0) 18:04:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfk\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:55 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x431}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf4000000, 0x0, 0x0, 0x0) 18:04:56 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) r6 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r7, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r9 = socket$inet6(0xa, 0x400000000005, 0x0) kcmp(r5, r0, 0x3, r6, r4) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r10 = dup(r9) bind$inet6(r9, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r9, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r11 = dup2(r10, r8) write$binfmt_misc(r11, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000b80)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000d40)={&(0x7f0000000b40), 0xc, &(0x7f0000000bc0)={&(0x7f0000000cc0)={0x7c, r2, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0xc0c0}, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0xaaaaaaaaaaaadfa, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e5667add0090031851db26b7ea8762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x5d, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 664.251320] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf5030000, 0x0, 0x0, 0x0) 18:04:56 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a68c75a83e1dbe1377c477e5f511e8b6446dcd51e4c28a3a14978de401b200cccc6467579bf4dc7f33c04e280a57445ed0eb1162f88c7af97418bcaad410b2d82b83aed5c1ff2950e70d45471f172f9f7ff6e5daf0220a1c00e92c1e43da6f8c44f6208ea676bc688df030ef99d335b892c4585d5de76d7274018b0f434916fd2678a22f12d0de78dfec70d3eaec8c182f88068e62af0860482789ddb2fb14e8a627ce2ebe2a793df6f344da0695fd896bfaddd8e573ca5bc8aa88a5584e770ad17880a9496f5a6cb1d1054d5542e475aa661b90248a2273170d17d3d765fb54b96ddea8f31257d4aa50988ba4cf0f6d63dd6ddb38a3e4ccb7451045a800f3976581c43e0fec5035554c447106389c300f09b978fe9a8e9d7f1e45f437268dc89e72971dc35a9d8d746dc760fb751b3786cee700a7988283b1da35b1ff74d7ac025e7d511eaeba4388407073946a6524b3d25f131ee254edf7d26031d89853911e0db9f7d23ef5f970e9ba363e27800517db8f53068e60e496fa39d9d93885bfd91c95dd48cf1317eac4e74669305a2dde3ed506480a1eabea7c2c188c285453f82d33bc1330467f1ecff0d1487aede3d157c6d7d27b247e3e717435037c91806c57c4", 0x3e3}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) [ 664.359153] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) [ 664.432452] input: syz1 as /devices/virtual/input/input1217 18:04:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfl\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:56 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f00000001c0)=""/41) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) fcntl$getflags(r4, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000440)=ANY=[@ANYBLOB="73797a315e3761f3bae3a97934f14d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb1a60dfd50f7d9cc956862c27bb7152f7f148751c60406b808149c86e941e9ed6b08108115544d25d6be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c77102701cf371f00ca73983fd7482b9134aa77d477a9242f58191575ad2415fcdff2526d004e47f6dae46d17017e4b0b12de2d9fe8697be7000000781218006f86578fa9dc9198e506fbdd593afa8045b8637cf94ece4f6336bd8ff9b924"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:56 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a68c75a83e1dbe1377c477e5f511e8b6446dcd51e4c28a3a14978de401b200cccc6467579bf4dc7f33c04e280a57445ed0eb1162f88c7af97418bcaad410b2d82b83aed5c1ff2950e70d45471f172f9f7ff6e5daf0220a1c00e92c1e43da6f8c44f6208ea676bc688df030ef99d335b892c4585d5de76d7274018b0f434916fd2678a22f12d0de78dfec70d3eaec8c182f88068e62af0860482789ddb2fb14e8a627ce2ebe2a793df6f344da0695fd896bfaddd8e573ca5bc8aa88a5584e770ad17880a9496f5a6cb1d1054d5542e475aa661b90248a2273170d17d3d765fb54b96ddea8f31257d4aa50988ba4cf0f6d63dd6ddb38a3e4ccb7451045a800f3976581c43e0fec5035554c447106389c300f09b978fe9a8e9d7f1e45f437268dc89e72971dc35a9d8d746dc760fb751b3786cee700a7988283b1da35b1ff74d7ac025e7d511eaeba4388407073946a6524b3d25f131ee254edf7d26031d89853911e0db9f7d23ef5f970e9ba363e27800517db8f53068e60e496fa39d9d93885bfd91c95dd48cf1317eac4e74669305a2dde3ed506480a1eabea7c2c188c285453f82d33bc1330467f1ecff0d1487aede3d157c6d7d27b247e3e717435037c91806c57c411268e7b5a709723b68ef1a8faecb6ac852e9a1d623dbd05f7f3b4f1744206d58fe5a5e6ad0f9bff712127c530a85675c731d845d04b223207f218b2110a", 0x421}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) [ 664.715928] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:56 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="ec1b6ccdbd659a10589940d3abdf6f7761173006dc456c854d69736e967a9303c4522737dd076d18ac94eb2f7419e10d419640757292b31fc96d71763fca1b2d65ccf5c04addcb592731e49fc8b6fae7b981f83832f33bb3dfec9ded59c0a0c79847f27a91b640f158c37acd612326971588f84075dde2a21931446dc325f206390d713d2243eda0317d8b9e5b6687e8a105ea84b288c19e4f766c41185ef132c44f316f4cba71477c6a0f5627efec19e1edf211bae74b6592debb00fdcd550bd5f69ae41b5cd1f8a7a7b31ed1e3f7026bba622c03555c70de6ca7807c52307cdfe72e2a4f7175da02395830d216736837b901829950fd8da731a77462d66a8067a38d923fbbb62ec88fcc57b6e9955472daa7db64492155c4a6eb53eb91793b617e8dc311f84dd3ee54e8d00920e4a5968b96983378e8e9272d6c49a9ea9eb28a218ad185ea712ca9774fe5bb5aec1017e0175c6419f74dcc729c3fa8b83e68c6dffdabb585ce9676bd87c8476bc7f1cee8b09e09a3bcf905017a80f12876fb83e2ebca334ea9078f14cf792ee9985a82e1e434048451ae08d10b33f1a55fae8fcd5c6e7455815b8a9c83f25a4d4f5f34549d08e988e433787778e26f6674e2019d630791284296651ae1335b70d1c40643870681b93b344667f2eebbfbd3a47b97dd9bc88423a1a0d5ba7973c9906a3b6e5c39a1105840404264b4e2f68c75ea5b2151577e39d9890f48daaae8c16fe6e022b21a588eae99259f23419ac454a68c75a83e1dbe1377c477e5f511e8b6446dcd51e4c28a3a14978de401b200cccc6467579bf4dc7f33c04e280a57445ed0eb1162f88c7af97418bcaad410b2d82b83aed5c1ff2950e70d45471f172f9f7ff6e5daf0220a1c00e92c1e43da6f8c44f6208ea676bc688df030ef99d335b892c4585d5de76d7274018b0f434916fd2678a22f12d0de78dfec70d3eaec8c182f88068e62af0860482789ddb2fb14e8a627ce2ebe2a793df6f344da0695fd896bfaddd8e573ca5bc8aa88a5584e770ad17880a9496f5a6cb1d1054d5542e475aa661b90248a2273170d17d3d765fb54b96ddea8f31257d4aa50988ba4cf0f6d63dd6ddb38a3e4ccb7451045a800f3976581c43e0fec5035554c447106389c300f09b978fe9a8e9d7f1e45f437268dc89e72971dc35a9d8d746dc760fb751b3786cee700a7988283b1da35b1ff74d7ac025e7d511eaeba4388407073946a6524b3d25f131ee254edf7d26031d89853911e0db9f7d23ef5f970e9ba363e27800517db8f53068e60e496fa39d9d93885bfd91c95dd48cf1317eac4e74669305a2dde3ed506480a1eabea7c2c188c285453f82d33bc1330467f1ecff0d1487aede3d157c6d7d27b247e3e717435037c91806c57c411268e7b5a709723b68ef1a8faecb6ac852e9a1d623dbd05f7f3b4f1744206d58fe5a5e6ad0f9bff712127c530a85675c731d845d04b223207f218b2110ac6e4fe047a3a49e699786cb67ac4fadaed8746f84a21969c483b006ddadd18c7eda482fd213c2e733a98b8bdc790c936faab382d1b9adecfd922aa5787eb0593a71f3f7ee1720b93f9b5df9ac1e4be8c241098a9ac5d53692863b20d59be0cb1287b9d30ddf6cbb26eb75642c14f97feec5f9eba5d780a90fecebce83ef44d6a7e322a48e30d93a5e52344301e9656abeb7f8d69c3c88730a76ebc571b0985b18c139706725a05b830c34b30bcc8d449dd0724de1e4c46694aed33abb80631d9f1e56c4e8ee4b16f6f610e0839352444c4b521f89401f05cfba66700a5efcf738ee6bf550c13fd4fae91efe37fcd20fc4895373fee062ed59878b26d360f6b58778534f2aa153cc490fd389defa21d0be89eca72ced602f36f3fd1ba2d8596725b97d0b652b7d268a2969042514f877ee37dc80c2094533c8a0e701eb91c4a3614a39f4b85f0442e6764c67966f54ee2018358e263ae2951a43e5de08e584a3f51632084fae2b3a0ae9a6aeaaa89ce156ba17938be7b76eaf863ef7dd089ed0a960922f957eaed77585ec93104767a1c517edac3cb67be6eda9622b908cb98b4283d9d3c240751c8a01a0326bc40bc5810a0327a", 0x5d5}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:04:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffedf, 0xc0, 0x0, 0x21f) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:56 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf8020000, 0x0, 0x0, 0x0) [ 664.903285] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 664.936701] input: syz1 as /devices/virtual/input/input1219 18:04:56 executing program 2: 18:04:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc010000, 0x0, 0x0, 0x0) 18:04:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfo\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 665.064547] input: syz1 as /devices/virtual/input/input1220 18:04:57 executing program 2: 18:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) socket$tipc(0x1e, 0x2, 0x0) 18:04:57 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x80000400000807, 0x400080000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x2, 0x414000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) signalfd(r2, &(0x7f0000000280)={0x4}, 0x8) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x2, 0x0, 0x8, r3, 0xb40}, 0x2c) connect$inet(r6, &(0x7f00000002c0)={0x2, 0x4e22, @remote}, 0x10) r9 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$VT_WAITACTIVE(r7, 0x5607) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r10 = dup(r9) bind$inet6(r9, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r9, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) dup2(r10, r6) write$binfmt_misc(r8, &(0x7f0000000640)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb8b9bf1d04976ae4b867458d87d1272bb00534cdafd30244080fc00a62f8a54d41fb3481d7416dd856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b300007e9ed07977047b8aac5568d60b4c597c7764339fae37eb5bca72983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6c4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11028ce16b7eb6000083e606c31719e76414bb749c892326c8b98649d248ac33d8a6fe842f4bd17935410417bb61cb31e72264e2f81f028d0e4a7042a37a6a93797b8089d6d421d2ddbd4a714148cc16bae3c9cacbec1550e12f60568ffddc09206b983dea111d5947d7d993d21991903016d9034cc98edf18ab0328d31f0e703e801f56855c5d112d5a210caf8fe2ca7d313d51c97b37e8022d281f4eabc7713e2814d4e51b353bd6a1fb09ed6227d5bcb96ec578d84e39347927cf95a77e355f975f90f25c395d096c0476a4849c0c0b7d2242ee5cdc09b2f8763aa961b6e072b7ba22a980173a09d900b88ac8bdc5dca7df87325bb77cfca00924861b33df97579173"], 0x14b) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc020000, 0x0, 0x0, 0x0) 18:04:57 executing program 2: [ 665.309378] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc030000, 0x0, 0x0, 0x0) [ 665.390338] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 665.406738] input: syz1 as /devices/virtual/input/input1221 18:04:57 executing program 2: 18:04:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) 18:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfp\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:57 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0xffffffff7ffffffd, 0x400000) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) [ 665.516081] input: syz1 as /devices/virtual/input/input1222 18:04:57 executing program 2: 18:04:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 18:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) r1 = socket$inet(0x2, 0x3, 0x800000000000b) getsockopt$sock_int(r1, 0x1, 0x12, 0x0, &(0x7f0000000280)) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:57 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) r4 = accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) r5 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xfffffffffffffff8, 0x189000) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) r7 = semget(0x0, 0x2, 0x100) r8 = socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r9, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@ipv4={[], [], @dev}}}, 0xfffffffffffffffd) fstat(r4, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000940)=0x0) semctl$IPC_SET(r7, 0x0, 0x1, &(0x7f0000000980)={{0x1, r11, r12, r13, r14, 0x20, 0x2}, 0x3ff, 0x4, 0x10}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r15 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) ioctl$TUNGETFEATURES(r10, 0x800454cf, &(0x7f0000000340)) r16 = dup(r15) bind$inet6(r15, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r15, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r15, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0xffffffffffffffc4) r17 = dup2(r16, r10) write$binfmt_misc(r17, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:57 executing program 2: [ 665.824668] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 665.856005] input: syz1 as /devices/virtual/input/input1223 18:04:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 18:04:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserft\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 665.905403] input: syz1 as /devices/virtual/input/input1224 [ 665.937916] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:57 executing program 2: 18:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x5c03000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 18:04:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="73656375726974792e7665746831000006000000000000000096d1caf3602b9d3f0e4e519901b2357382d01e870ab8bc8eb96dc1b6a2cf31f6bdd9ebac6e10d723b3b622634111bd4ebb9e9fc5dfb4a08adc611ea674a1371a5e6b7b5894ee8785950112cd628c663767a5f2f48594939181d79a75c644b1d387c552796b13ef"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:57 executing program 2: 18:04:58 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x400}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={r3, 0x100000001}, &(0x7f0000000340)=0x8) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:04:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) [ 666.205882] input: syz1 as /devices/virtual/input/input1225 18:04:58 executing program 2: 18:04:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) [ 666.314068] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:58 executing program 2: [ 666.415400] input: syz1 as /devices/virtual/input/input1226 [ 666.462654] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfu\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, 0x0) 18:04:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:58 executing program 4: 18:04:58 executing program 2: 18:04:58 executing program 2: [ 666.690803] input: syz1 as /devices/virtual/input/input1227 18:04:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 18:04:58 executing program 4: 18:04:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) [ 666.833917] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:58 executing program 4: 18:04:58 executing program 2: [ 666.902340] input: syz1 as /devices/virtual/input/input1228 [ 666.998976] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfx\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:58 executing program 4: 18:04:58 executing program 2: 18:04:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x101161970, 0x0, 0x0, 0x0) 18:04:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="517b44ac14cd47baadde43e80771d777febd4843ce5bef029055ceddb71677f9cc724707f014b786a1d8d8c128319c2543510d1915c87322d3f4cb18079a78557a0109facacff9f833e323373a62a9d9f3e4c0e043bf39d6deb4594ef7c1a3bf19608e0d347eb4e1b47988891f0bf440adc1016ef0d7b9000000"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ab\x00', 0xe) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:04:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x6300000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:59 executing program 4: [ 667.184242] input: syz1 as /devices/virtual/input/input1229 18:04:59 executing program 2: 18:04:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 18:04:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) [ 667.335271] input: syz1 as /devices/virtual/input/input1230 [ 667.364825] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:59 executing program 4: 18:04:59 executing program 2: [ 667.504293] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfy\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000000)={0x2, 0x1, [0x7, 0x1, 0x1, 0x4, 0x9, 0x3, 0xffffffffffffff81, 0x4]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) socket(0x73450edc6ddae382, 0xf, 0xb8) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x40000000000, 0x400000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:04:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 18:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x6600000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:04:59 executing program 4: 18:04:59 executing program 2: 18:04:59 executing program 2: [ 667.762565] input: syz1 as /devices/virtual/input/input1231 18:04:59 executing program 4: 18:04:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, 0x0) [ 667.878842] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:04:59 executing program 4: 18:04:59 executing program 2: 18:04:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe000000000000, 0x0, 0x0, 0x0) [ 667.981631] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfz\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x6, 0x4) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:00 executing program 4: 18:05:00 executing program 2: 18:05:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x0, 0x0) 18:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x6700000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x02', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:00 executing program 4: 18:05:00 executing program 2: 18:05:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x0, 0x0) [ 668.889817] input: syz1 as /devices/virtual/input/input1233 [ 668.958476] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:00 executing program 2: 18:05:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 18:05:00 executing program 4: 18:05:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) readahead(r0, 0x80000001, 0x6) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792e766574683100000000ffffffff7857fd"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:00 executing program 2: [ 669.119662] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 18:05:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x03', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) [ 669.221867] input: syz1 as /devices/virtual/input/input1235 18:05:01 executing program 4: 18:05:01 executing program 2: 18:05:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x201000000000000, 0x0, 0x0, 0x0) 18:05:01 executing program 4: 18:05:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) sendmsg$can_raw(r2, &(0x7f0000000d40)={&(0x7f0000000bc0), 0x10, &(0x7f0000000d00)={&(0x7f0000000cc0)=@can={{0x0, 0x517, 0x90000000000000, 0x8}, 0x6, 0x2, 0x0, 0x0, "34ed6354b8e213ec"}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0xc4) r3 = socket$inet(0x2, 0x7, 0x85) accept4$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x80000) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000b80)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, r4}, 0x14) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:01 executing program 2: 18:05:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) [ 669.541591] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:01 executing program 4: [ 669.613021] input: syz1 as /devices/virtual/input/input1237 18:05:01 executing program 2: [ 669.703147] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 669.720957] input: syz1 as /devices/virtual/input/input1238 18:05:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x04', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x6a00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 18:05:01 executing program 4: 18:05:01 executing program 2: 18:05:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 18:05:01 executing program 4: [ 669.995730] input: syz1 as /devices/virtual/input/input1239 18:05:01 executing program 4: 18:05:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 18:05:01 executing program 2: 18:05:02 executing program 4: [ 670.155480] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 670.294017] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000000)=""/20) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x05', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 18:05:02 executing program 2: 18:05:02 executing program 4: 18:05:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:02 executing program 4: 18:05:02 executing program 2: 18:05:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) [ 670.466449] input: syz1 as /devices/virtual/input/input1241 18:05:02 executing program 2: 18:05:02 executing program 4: [ 670.640298] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 670.666464] input: syz1 as /devices/virtual/input/input1242 18:05:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) [ 670.748218] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000240)=0xc) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000b80)=r3) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 670.916891] input: syz1 as /devices/virtual/input/input1243 18:05:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x06', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:02 executing program 2: 18:05:02 executing program 4: 18:05:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) 18:05:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x7200000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 671.011086] input: syz1 as /devices/virtual/input/input1244 18:05:02 executing program 2: 18:05:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) 18:05:03 executing program 4: 18:05:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:03 executing program 2: 18:05:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) 18:05:03 executing program 4: [ 671.309097] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 671.339774] input: syz1 as /devices/virtual/input/input1245 [ 671.428407] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\a', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 18:05:03 executing program 2: 18:05:03 executing program 4: [ 671.501182] input: syz1 as /devices/virtual/input/input1246 18:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x180f000000000000, 0x0, 0x0, 0x0) 18:05:03 executing program 2: 18:05:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000240)=0x4) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:03 executing program 4: 18:05:03 executing program 2: 18:05:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) [ 671.818964] input: syz1 as /devices/virtual/input/input1247 18:05:03 executing program 4: [ 671.946430] input: syz1 as /devices/virtual/input/input1248 [ 671.981081] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:03 executing program 2: 18:05:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 18:05:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\b', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:03 executing program 4: [ 672.213923] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x7500000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:04 executing program 2: 18:05:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7300008000000000000000"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 18:05:04 executing program 4: 18:05:04 executing program 2: 18:05:04 executing program 4: [ 672.425778] input: syz1 as /devices/virtual/input/input1249 18:05:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) 18:05:04 executing program 2: [ 672.555284] input: syz1 as /devices/virtual/input/input1250 18:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\n', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x0, 0x0) 18:05:04 executing program 4: [ 672.636203] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 672.786655] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000b80)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@loopback, @multicast2}, 0x8) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x7700000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:04 executing program 2: 18:05:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 18:05:04 executing program 4: 18:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\v', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:04 executing program 4: 18:05:04 executing program 2: [ 673.018217] input: syz1 as /devices/virtual/input/input1251 18:05:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) [ 673.109393] input: syz1 as /devices/virtual/input/input1252 18:05:05 executing program 2: 18:05:05 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x2d0}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:05:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) [ 673.246086] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x2b, &(0x7f0000000cc0)="68a4f324c5b70ece2d03163a277eeadfb5d7cd955d703b6cad2b0525f7151be7e4bf1b86af6f010994a16b6a21b2e2d1797bc5471270212dc6b80631a53d7bed1b53afb2735865e87f7927b562d28a9ee100d1f245783535a004ac3371c5febb2b56a1b48d796c18db890117d23e09511541e961846e6948373fb418fec29561563e9c1a", 0x84) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 673.387062] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 673.415633] input: syz1 as /devices/virtual/input/input1253 18:05:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:05 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000100)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, "80"}, 0x119) write$UHID_INPUT2(r0, &(0x7f0000000240)={0xc, 0x1000, "1b41fe097913e867b6c40dc9ac7f8f92617e5182ec10d03c6c3df829d418e66477fd1043ba35c0548b6be8f790364e5a195abbf844ce4fbb083498f6486006c605fd958ab1f4083c90af14fd46490bc0435f5585e79f44b99c4e9d216ae7692f68b4d84ddea4a2f49f10e14ec078dbeab15d0677c88177ab852e64e74c1a01e999ebc81dbcdfd78bec6a3ac5d867587a41412e14d3ea04064ffd84b5e6d72598d8b8e20f5de1cfbe05cf25af3175d5bbbfa200dd3db085456355a42f1c04f440b44c5df99576574e664f042856d65cc9f5eb890efc748e1f36236be6c4405744d182251431596259e1ce98f2b2b7727193b564d810f00bbadf60a22059539c0868def47d12f9a49ddc8e4726dc715e3350d2c33dc3ab0be7d376e900d78fe3ae5207d6bf1ae32caf81a37dd49ca3a72c824bc6dfae2849b8dbf2c56e794853fecda30918b1da6b6873af4c3f7ff37da79b6a47f8e18e788bf1af1e5631ee8fca54a63dec48677fdc99d3d39f8e3eb2312c011db5271df7bbf47a7197d867d9281281df27da611aec612da9f98e0d292bfe3b8e4da1e011eaa3deafd06766a005a7fc24cc181cc5dabae0d710c05c030a65ccdf737a8af820de53eeb4906db81146143015af78ac442ffcd0b7d2524004dc6422b708a2349dc468a47e2b37c7d09008b34b3a184f6fde5e4b0e76a9d959d31a3323591a5b8bd7032313aa8443ce9c64afec00aab7f933062f9644b5d23ae49facdba471753d2fe27ace9d54bdf665d86759e58553059ecea0723f4220b931e9d1f03c8fcbe4a4a6388d326ea845a285ad5eda5a5d820ff00ec06fdb720f3fdde6096a073206ecb5c49803764799e89a74c00ccaf62f50ff79cbd6c081f048a52929fd19a4eb1a92fca8b874a3292e3c45d7ebe7718327dd7102ce26c2f383ce7924f6291d2320fa24f15995d42f2894c64042a91da29ab8dbf51a7227e364fd820c6c5cd66128570241f7298b6bbf3e1abe181d7f9730c0a1af2c6b586a6e4d8bf8962723317293e31cd1d33cdaf0a482de97df2e2108ff2e7ce683b10911bf1d86363f1e9e6c621432e69c41b112b62a910528d9605afcb354897f3f03709c41ed9d85f01b4fd8354c9a39f6868741984151fbc0db8c340bd0a5fa1db3e1efe664ce74a5892809b564b29687f23b57fd02499ee9acb23d99ea45a4df3bfb065dbd4fe6153ce3b11167130ce3dbee335bf9020ea40f9533dba10961a9986cacd8376c18b1c9a539ff505ab96fd4f81f64430d29c8268f9766984b60a02675f41cf3ff35a04c75ec4bea4b21258f968ce72afe619290d26c39a3e4d73c70996f8ca8cebb340e51b80e0ce4aa3c7c8aa2e9cb74eb397034fcf69080a95ab86ddcf442db10d97411a257791606946aeb4e75665ab114855f1b8d722afbfe3b157ef223bfa8cad1ffb7d096e286895906368c36a3fb19d87f4373d48ee9a6a77df229a51cfd49b7b449b043c242908617a1b2f1664ac91f171f90079fda3ed3eaa9f9a1e48698854430b336076ccaaebc943a217c1ee383e874182c0d8cf05a0d6f7a571da529c0afd650436f89737b9faaf35d6806e049431348551de546c77a9a0eff6b774bd4f10f0279f5c7570f70d406bebdbf1e509845ab3f927b72a1bdc90fa0d3d90d6dcdc8259907f3a542ab2352f64e5db7af3d84acbbc6bd31656d7d95513131687e4597043c1a2c71250b0e309872c5ea840eca84e4cd659b8521b3cce6e418d7530331a4ae0424d388f4b2b3df2a4d93005182a425a0d9f9173865726b9078d4347f830ce608fe2a27cfdbbe34ccdd4a648adbadea080a6aee568842f8937a5d422f81856afe1a5565e598b142c29b947a7755f8ddaf1bacffd4a39a4919897b3cb2fb3c61dbdbb42f776d88908012a7a08473ac99bab975dc6eda1b71609abd4fe6fca6fec84f3d031037007f80f60684bd632bdac2ae8ce318e19890e358213022795fe28f136cce0913dc60fa2b53d709fce0a773127b39fe5738d4326248475a4ea95ed6196daef8bbcc593ebc85c0aa66b36a3ee62ea04909e0a2dd649a9b614eebc0c7a9991f98c876985fd640fdb221380e9ec3c5ddd2e3469cb0238e90be0d1adf9e3c3a93a485f7da10ac3e67eb6ac9f00ea54a487d10a6b315ca9a09ed9d6df047c6688fa31f8f71cd2209a7a1b927f1be446ec4965b848df001eb9b1d98e791954586f4904053b6e3ccea913f2611051359d2c242d9da8c529b0fa51ccfcf0ee34385974d4a09f4fa2d0edb573f6d665dda16caae6a9148384ae4a65855098f2043137b12fa10bf6d7a723c935ad034e76ff6bbf53adc1d7cc9aebacd6ea6ee1c5235a485cbd2fedaad78394fb280febdcee6577802b4c0e693b09808bc32e8143ec137ce3978b5f215e630bb727ab7eac6747a1e7212e9fe687d3596fba922f4b161ce4b3c6749a8bdaddeaea9a408a60e7113baa7c8e210aaab320db59a2dd6f6d336b2d8a1035ccf7427d66a4dad5a10ddf75db426cab31e1a0b2f1003d0e4b4e7f66bd007f411cd79d78d995833ae782bd60d3971c1a235a14f3ea6f5411d2f6a79d2c7f4f653da85fa66a17db5f730cba8a85c2738cfba20edc2e4d4162ae6e2c774f5b904dae59c6128c1f570e8dd5bbefcbfb6996dce628e5e642675658701e5a66c9f5e2583af6e82053f119a8a31690455f2a339cabca2bd18c4cf4e3dd5dc53a67d9fb911432610c54c5509c8510a471f14ec8856e92b348c145cda71fd5ec4019235d38d34350bb556eca18a1a2f11e9aad850af65cd2c6170430628c985b21ef292df05ec3b98c1d56bd180957aafe3cd4aa2caeed0570d8b341c12dc7b269607c30d6382b42eed5c0e40512fd18deaacd366a416ce757fc823c7c8bfd5b3290e658738dec572e27b41b7135431ff4c72e558ab68da25785a20dd4798c39e84d1d098e333547077b59305e20d3c5d1864a519e16b430881801bf131c3702e9f3737e50e210b578cd4e3bb752f5fd81aa9cece74ef89fe96b23c36516cffde8c3183bc767504478655e5bad44b97412afa8f5f111fcc076997d457217ec2aa580bd66f245bfbc8cf1ed82821ff17b52e33cf3bc8b760f5e0d42f998e609f5451140f199731406ba1f27136f03cacc95649cb80b7348d8a14447630b4062d2a22a91752c3ebf827fd9558b2fde3bfc08f3c6f5c8dbfbaa93faff1be06241a4582e1a8f71a043d82d70c48020369557ddb57ee56befc8a7160d5714c0288fd0b05a09ee94dd5d140ef37b3ea3b42dd48c5130cce056d74c01b046ff218e19f6e67951ba306891683ca81012e4f5a526b6666e17a431540090ba58b8ad818bf14fe1cc0748e0941ad552edb2ccf292124546aea55ff1a511c5a5db998a36b9a2fdf0fba9b484c7c2356ca60b561277a384f4ed3b85dc5b4aa3dc77315254d1e5f36204d6ae40b856e851e8f0522c9271ed190db918f111edf9de548bf0ae8740d6e320db5d729e022ea50bc0df44d5d5f0aeb81dd7b2590a5921758f837d6e21868b46e4e2f26b692ca26df00611e0a821dc5e3e10f65a911eccce49588d937653d2ef580a0b3d07ff595b9ba10116c39596e6afee04538c99633e6ba00622e560f102b7c8bf4083fc74d77fb67329ae7b6def14d4e1a0232b1323ddcb3c1f5fc3a58f212ba4006369687d5f0879390833bb137e691d6e0240ffe9d130bca81e9732a7345fdf8432e6619e6dcb9aaa6aac1d182658a5c7ec17678f5a3eba5dc4b32baf22334c48c33979c14ccecd46be6a1c46866032272f47d77a8a84d25c6fe0a1fe6b7ecb1352b5fd0cd552262aa36c3db3a2fd5281306eea110c0c892f7c7560976eab39b69abb480a1beee69c08eb63d0182a4612876d427860e7af42bea908ea7f7537f6c16fa77d22c44cf180d13f813806efc2d202a9f7e007f23c8638ef335073d0b2e782fc4f506959f8f65990d6abe3700a9b054252e481ab065bd4d6987013021b1d9bc086ad7f7ac2b849fdb91e3b1187f1c843d7d2b01955cbd91cd30b439474200c809e53bc072818438aab480d275ea45e68845dc15a2d81265e4a952eace59b8305800a17d61485c41618032428769a404d766e865b7b5ab4b5fbbcf3a5b9d6ef82a6231e6c9eda25e3f88f890a885a838078e2dad8c42d27bbc676fef1aa63c767ea6f703a0902d64ec9a2acc2dba41d1ea5aa56ee277a9528350c83816d66835c9cddfeaeab74c31405f750404b7c4086d1944298899a09e71d949ce21847f4134dce835f42d7b38644604bd082aa9de6d8cf77a622e4e2d6062f88bf46ab33fb9a4a1c9a7429af36a85c5195ceacb5e7883ffef09adfd98a7c342e81822940011322395780f70a8cf470326c1c643f11401a1addac594380e2ac00968ab4943633edf4a0c177a8274af3f19e2592ecdad9f6d14f7d8bfb32d2a5534a2f4e0da9f4256ed81dc3281cfe289982298f0ec16130103abb7586d6ddd0c264ac730f27bd2ce1bff9f6b893cad0aea3d8e4ea0360716f2dbc528fa5151423897df1b2f0ef816c13e0f7d84b3a3f845d03eb53a1492b2c2848a0457d8319722105b205ab7c7144f158d387bd5e8da25b7d74de12a6db984c636e9062463933a91384f601d3a0518956e3b6506d7dd6c411602f6e9dc2a0efbf2379b1f1b33b6f3348a7aabc3af592599f129679037209ffa5954507a6d33c16e98a36a54386082079f4cff367169b098643b992968a3108ff7bc871fac18c1629ffe4fc79b8293d8c1bac3414570c5e7d98c4c8e98bd3788d5e9c164be03126fa66db87bed4a475b89f2c2b3340da35c71cd1eec6255dd52490609e75d06533e299b08d013ab49fc55f856ed0aae2f305733fe508f24a5674c6e70a7d36377bd3039baf0e6512c3e57588671c7897460fdd2afd123b823ddc5a375ea0db8995175622d068dc79f896e0d3bb50f130ae1cb65d80a741f8bb560f8c1a02ccc05c0d89836a52336c225cf77445c5382726894298e1cf43bbf397057ee4be7925b68eaf8cd75c7f7127d8c819ce1dfcb9f2856233549e86071340574d5513292d0ceec747a30c84ef708302221306558eb0da0d902df593d1846100d654460f9035036d514e3f889278fd02b997054a1453c9a04455484a3ad3db72f47bbbba89e141439ee441a8c27eac88f8e622e6546ad6310f37e94493513b90175c1a23dbaa1f5189160d47a7872525a382d7dd515c3e6f9e30bf7d5728ded69f9f79be473c369655dbf59f7d0efaab0ad4ff2e07bf13fa5e9fa0ac9aa5b0b04f7f486be6234132bfc0405c5ac03b765e6cbd88e95ccd24445b79eaf608f7584203db9bbca634f3843e431bee7bca7dcca8fbb2c6b714a1445408f61c510c6067f5b4f2e479a63e57bd1558c1ada687e4f050c26a2d9ed9e9bc6bb9835c7b8a0134ea46455a37f2f55cd6bf8bc928fbd3ceaa1471f0949c15d54557f2644e95a90dbb42b8ed513c43d9519ea7567a72e476a5cf6683eb53dadf14f399f2986ba08c37e50937cd7b91f780b77d737b863f2f715e0418f3d7cca2665b987803e180afb96efd3de50cd652bdf1751d45fb938e72b52d51edd8f42f903e4096f2eda79e5453e37b5c236c07e8e8bad3347b1ab3f6860cb4c50b5f4f67c917fa6d96c146b52054f215ff820d7445224334dcdb72b01291bd40131175f5ae318f609c14d43d22bcdbf68db155863e8abb587cc712bebe9ec21964e89d309d725332a17849ef233e99cab05052c92bc9f1c684c7746e5c38e456c13b79e897969e07ede695dbea67717"}, 0x1006) 18:05:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 18:05:05 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x264}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:05:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\f', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 673.517929] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.04 Device [syz0] on syz1 [ 673.551860] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.04 Device [syz0] on syz1 18:05:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) 18:05:05 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x277}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:05:05 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000e00)="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", 0x28b}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 18:05:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x2) sendto$inet(r1, &(0x7f0000000b80)="915543f331e84cd3263bfe043470cabca3a237faeb95336aeb8e67cfabb42ebaa3c0480a4a12457ec190bd27d312e5de9e6320d7b670a3f3edeea3f1cab8ab0c352ccd42a73447", 0x47, 0x1, &(0x7f0000000240)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x444, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) [ 673.729359] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x05', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 673.794343] input: syz1 as /devices/virtual/input/input1255 18:05:05 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x80000400000807, 0x400080000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x2, 0x414000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) signalfd(r2, &(0x7f0000000280)={0x4}, 0x8) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x2, 0x0, 0x8, r3, 0xb40}, 0x2c) connect$inet(r6, &(0x7f00000002c0)={0x2, 0x4e22, @remote}, 0x10) r9 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$VT_WAITACTIVE(r7, 0x5607) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r10 = dup(r9) bind$inet6(r9, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r9, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) dup2(r10, r6) write$binfmt_misc(r8, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x14b) ftruncate(0xffffffffffffffff, 0x2007fff) 18:05:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) 18:05:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x8000000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 673.965458] input: syz1 as /devices/virtual/input/input1256 18:05:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x0e', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:05 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) sched_getparam(r1, &(0x7f00000001c0)) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:05:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7019160101000000, 0x0, 0x0, 0x0) 18:05:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) fcntl$setstatus(r0, 0x4, 0x44400) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000cc0)={0x52, "d5850538f1f81bffeec93fd016d50e068553903684f0b25bf4ce83b2ff5130857dc9ee8aad72dacdca04cd144de217d2c0886338f956a0742272d237d179c31917852dcf2f2531c49f0dc67971cbfef852396e39ed20c029297f0e807bbba571ad6aa8fbf680c8e25b1d4b939b13f4d6cb1d569b005673c65b5c40a749581cf3"}) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserks\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 674.147053] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) [ 674.225887] input: syz1 as /devices/virtual/input/input1257 18:05:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) 18:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x10', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 674.429551] input: syz1 as /devices/virtual/input/input1258 18:05:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8000000000000000, 0x0, 0x0, 0x0) 18:05:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="c3ef7b5aef079eee3e6619e043047c3b11db4a0b342a70b93789fd395c7b02004315154439241969d2645327c7c386f8737ac9b1d2a3047699bd6cb0bdd438ca74688f75dc9353157f0900b8570ecb55f99fb58dcf05fa2dd708c4780bd195e5f3da6ec62ee59a1235038d59386c5a73a051f8035c5a70f28efdc7e7a749e403e3d8fd99a95f6ad4ed6e678d09458e22b1e778a94a2641eef2dfb35dac"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000240), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x86dd, 'syzkaller0\x00', 'dummy0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast, [], 0xe8, 0xe8, 0x120, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [], @local}}}}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffe}}}}]}]}, 0x228) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:06 executing program 4: syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x828c, 0x400000) r0 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0x3, 0x2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000440)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r1, r2, 0x15) r3 = socket(0x40000000015, 0x805, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) accept4$inet(r3, 0x0, &(0x7f0000000040), 0x800) getsockopt(r3, 0x8, 0x271d, &(0x7f0000000600)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r6, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r9 = dup(r8) bind$inet6(r8, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r8, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = dup2(r9, r7) write$binfmt_misc(r10, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb881b9b12d976ae4b867458d87d1272bb00534cdafd30244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6"], 0xa9) ftruncate(0xffffffffffffffff, 0x2007fff) 18:05:06 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x18200) r1 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) lseek(r0, 0x8020000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) sendfile(r0, r1, 0x0, 0x7) fallocate(r0, 0x3, 0x0, 0x8020006) [ 674.733128] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 674.774353] input: syz1 as /devices/virtual/input/input1259 18:05:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) [ 674.810575] audit: type=1804 audit(1546970706.626:38): pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir008871670/syzkaller.oibDXk/1260/bus" dev="sda1" ino=16834 res=1 [ 674.864705] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9001000000000000, 0x0, 0x0, 0x0) [ 674.949633] audit: type=1804 audit(1546970706.706:39): pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir008871670/syzkaller.oibDXk/1260/bus" dev="sda1" ino=16834 res=1 18:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:06 executing program 2: r0 = shmget(0x2, 0x3000, 0x1880, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000002840)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000140)={0x0, @pix_mp={0x69, 0x0, 0x2036315a, 0xd, 0x0, [{0x80, 0x9}, {0x8, 0x3ff}, {0x3, 0xffffffffffffffdd}, {0x100, 0x3}, {0xfd7, 0x1}, {0x2, 0x1}, {0x7ff, 0x40}, {0xffff, 0x3b7}], 0x7, 0x3, 0x0, 0x2, 0x3}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 675.081319] audit: type=1804 audit(1546970706.716:40): pid=2136 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir008871670/syzkaller.oibDXk/1260/bus" dev="sda1" ino=16834 res=1 18:05:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x5f, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x200, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x102d1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000580)=0x78) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc401023}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="00000000cdb57b55618cb4cdb41f4789e93b80c4f499702c60db5285324b39fa903c28367b09ec02deedc7cd166aa29a98be4fd65b589e98a0", @ANYRES16=0x0, @ANYBLOB="a810ffff0000882eb344377bf7ae63b9"]}, 0x1, 0x0, 0x0, 0x44000}, 0x4000) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast1}, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xeb}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x10000000000, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000a40)={0x0, @in6={{0xa, 0x0, 0x3, @remote, 0x4b1}}, 0xffffffffffffff81, 0x40, 0x1, 0xe3, 0x10000}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000b00)={r5, 0x7e210000000, 0x30, 0x2, 0x5}, &(0x7f0000000b40)=0x18) getpgid(0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$void(r1, 0x5451) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000840)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') accept4$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000000800)={&(0x7f0000000480), 0xc, 0x0}, 0x44891) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x21b, 0x1) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000240)=""/207) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) 18:05:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs.', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9403000000000000, 0x0, 0x0, 0x0) [ 675.209943] input: syz1 as /devices/virtual/input/input1261 18:05:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa000000000000000, 0x0, 0x0, 0x0) 18:05:07 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) lchown(&(0x7f00000001c0)='./file0\x00', r0, r1) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000080)={0x1000, {{0xa, 0x4e23, 0xffff, @mcast2, 0x100}}}, 0x88) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'teql0\x00', 0x4}, 0x18) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x13, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) [ 675.322907] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 675.384659] input: syz1 as /devices/virtual/input/input1262 18:05:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc603000000000000, 0x0, 0x0, 0x0) [ 675.537464] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), &(0x7f00000000c0)=0xfe18) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x3fc, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000180)={'NETMAP\x00'}, &(0x7f00000001c0)=0x1e) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) exit(0x1000) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)) r5 = gettid() r6 = getpgid(r5) setpriority(0x7, r6, 0x800000000000000d) r7 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x0, 0xf, &(0x7f0000000240)='wlan0\\}md5sum#\x00'}, 0x30) setpgid(r7, r8) ioctl$KDENABIO(r3, 0x4b36) vmsplice(r4, &(0x7f00000008c0)=[{&(0x7f0000000800)="50e005e6815dc6b00b10002c519c66795de0d52fc076f1eb6a9c58cde88a6eef0093b24a178e84740aa6d1618e2033d38d4aea0fb17cda5f8820a83864ac14405192e4549c3ad23fca5d187507c5a984d6a0c72683e7af2d4a21f453226de4a43305b6d0dce139e4c627395426a1f6fc0b416f9363eb7743f4a3d9e0203181735ccac1e530c361262a0a5e0a98e9ca3d17f2f2f0c116fa9fbdbe757d93e323d17f29", 0xa2}], 0x1, 0xc) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000200)={0x6d, 0x7fff, 0x400, 0x40, 0x4}) sendmmsg(r1, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) sendmsg$unix(r3, &(0x7f0000000580)={&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x800}, 0x10) timerfd_create(0x0, 0x0) 18:05:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs=', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd402000000000000, 0x0, 0x0, 0x0) 18:05:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xb401000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 675.706195] input: syz1 as /devices/virtual/input/input1263 18:05:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe001000000000000, 0x0, 0x0, 0x0) 18:05:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs.', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$x25(r0, &(0x7f0000001000)={0x9, @null=' \x00'}, 0x12) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xffffffffffffff2c, &(0x7f0000001040)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) sendmsg$unix(r1, &(0x7f0000000fc0)={&(0x7f0000000d40)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000dc0)="4b3630624680e02ae50c5b6ca37f5e79499c0e8cb8d30173ed17bc213d50c309e33358a126dd9cd389d8cddd6a7c0c4f4ace5ce628dcc26a09a7296e37d02d2b4f1d0a05bda38fb23cb5c16d1b782f23020fb3dbf54bfdcec06ea50f7b5ecbcc59e7de5b03913c21d2175f611e84c39fba4b2e16797fcba8ec3c026552261b662c2f4ba86ba7c7e05017ccb2b8ec8187adc76d334556e99117d84df8f234c0", 0x9f}, {&(0x7f0000000e80)="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", 0xfb}], 0x2, &(0x7f0000000f80)=[@rights={0x18, 0x1, 0x1, [r0, r0]}], 0x18, 0x8050}, 0x4) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x1, [0x40]}, 0x6) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000cc0)=""/127) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000b80)=0x8) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x7ffffffe, &(0x7f0000001080)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000140)={0x6, 0x3, 0x1000}) [ 675.918100] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0) [ 676.038125] input: syz1 as /devices/virtual/input/input1265 18:05:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf400000000000000, 0x0, 0x0, 0x0) [ 676.106898] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x7, 0x400900) close(0xffffffffffffffff) 18:05:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsH', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 676.221638] input: syz1 as /devices/virtual/input/input1266 18:05:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), &(0x7f00000000c0)=0xfe18) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x3fc, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000180)={'NETMAP\x00'}, &(0x7f00000001c0)=0x1e) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) exit(0x1000) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)) r5 = gettid() r6 = getpgid(r5) setpriority(0x7, r6, 0x800000000000000d) r7 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x0, 0xf, &(0x7f0000000240)='wlan0\\}md5sum#\x00'}, 0x30) setpgid(r7, r8) ioctl$KDENABIO(r3, 0x4b36) vmsplice(r4, &(0x7f00000008c0)=[{&(0x7f0000000800)="50e005e6815dc6b00b10002c519c66795de0d52fc076f1eb6a9c58cde88a6eef0093b24a178e84740aa6d1618e2033d38d4aea0fb17cda5f8820a83864ac14405192e4549c3ad23fca5d187507c5a984d6a0c72683e7af2d4a21f453226de4a43305b6d0dce139e4c627395426a1f6fc0b416f9363eb7743f4a3d9e0203181735ccac1e530c361262a0a5e0a98e9ca3d17f2f2f0c116fa9fbdbe757d93e323d17f29", 0xa2}], 0x1, 0xc) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000200)={0x6d, 0x7fff, 0x400, 0x40, 0x4}) sendmmsg(r1, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) sendmsg$unix(r3, &(0x7f0000000580)={&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x800}, 0x10) timerfd_create(0x0, 0x0) 18:05:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf503000000000000, 0x0, 0x0, 0x0) 18:05:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) sendto$inet(r0, &(0x7f0000000cc0)="a6f76585d9cf1a41470b8c46259c8db3bbc0ac9eecd2945c2a2dfb14ae67047ec848027684f909850e3b00c0915998a6a7da3b618c213f2a86f9b048570d18eea40947d13247b276d85d759057bdc90b5d9a0adfb6a16b29d426f0b4eeec5dbd07a79d173dc4f2f795a1c311c53e27f8d3c740146a3432d461a97f681677466266e0485aac73180e4f7d46df8219480b5df2dec7e60e7f424d9db49c5a15411137d68fea969775", 0xa7, 0x20000000, &(0x7f0000000000)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xc603000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:12 executing program 4: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) 18:05:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsL', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 680.614834] input: syz1 as /devices/virtual/input/input1267 18:05:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 18:05:12 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f00000000c0), 0xc2, &(0x7f0000000180)={&(0x7f0000000000)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x8, 0xc, [{0x2}]}]}, 0x28}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f00000011c0)=0x1e) recvfrom$inet6(r0, &(0x7f00000001c0)=""/4096, 0x1000, 0x2000, &(0x7f0000000100)={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c) [ 680.731936] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) [ 680.848662] bridge0: port 1(bridge_slave_0) entered learning state 18:05:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="2ef532ba85d571fc98c7cb4a3d3b1d2e6d088ffac44fb2e075bbf48efef67b51d4536e232ee5ae57fc15e0414b0d9daf20274b9af0cc7dd74cb617b4e005ff88b1068defd4346f65b105c623ba2ca2445c37ef954d0a757d1ec863f289890b2ac20ad59ec5fda69aba849b6a1dae175e7c96ba365cf972eaaeb1bd85685c5989009ef353b673d62ce1f584b216e922649e0f132384f6a0059573617a9fc49f8b1cf218e55857b12b7c43f4f49b04e68a5e486fd267cdcaa0d58c0264b177d06e3ed146debea17b95153b921d31e254040434fdc2b143ca06781dec8f037b4df6300207fe209e1b594d00f50c61f0565c59a395449f730cd4d17088b062fc0c385ef35fc3ab0f55c2bcf0"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xd402000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 680.917134] bridge0: port 1(bridge_slave_0) entered learning state 18:05:12 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f00000000c0), 0xc2, &(0x7f0000000180)={&(0x7f0000000000)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x8, 0xc, [{0x2}]}]}, 0x28}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f00000011c0)=0x1e) recvfrom$inet6(r0, &(0x7f00000001c0)=""/4096, 0x1000, 0x2000, &(0x7f0000000100)={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c) [ 681.001407] input: syz1 as /devices/virtual/input/input1269 [ 681.102363] input: syz1 as /devices/virtual/input/input1270 [ 681.208253] bridge0: port 1(bridge_slave_0) entered learning state [ 681.222173] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 681.339158] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a40)={&(0x7f0000000040), 0xc, &(0x7f0000000a00)={&(0x7f00000005c0)=@newsa={0x13c, 0x10, 0x205, 0x0, 0x0, {{@in, @in=@local}, {@in6=@loopback, 0x0, 0x2b}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha384-avx\x00'}}}]}, 0x13c}}, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000000)=0x1) 18:05:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs`', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf802000000000000, 0x0, 0x0, 0x0) 18:05:14 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000006c0), 0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)) r1 = getpgrp(0x0) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000280)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000d00)='security.capability\x00', &(0x7f0000000c40)=@v3, 0x18, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) sendmsg$nl_generic(r0, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="c1b7c7dd340000003e00020029bd7000000000001800000018002a0014009200000000ecff0000000000000000000001080022009c0850f5d4a7ab0b06741067df3cc6110b850e626a138242fa8c3462909db68ee4fd04c9c6698615e20095050078ea6fe4010b33e10b032c4c88ebed02bb5fd4242fbc33731ff609734612dee413e65b4a9102d0350764c52ee551c0614ef31f4e206a7ddb7f9c9d0e6815a7433d7b71145e1439d41497af760916892a1501a966d9b97813916dd7721b6c014ff86788f6c87b70b80bdfe2522ac7261abb8c6f9fd81888077cb1a980d26b1b17e9", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x4001) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x4, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000ff0100000000000037670000100f0000ffffffff950000000000004b7f37656b878778198901ff62bd72ebe20a145a12642f6fae2ac13bfbe8168fc5452dc0b577f010350be84a1241cc3f0f5b6af4274e385cbe61d5a66b2b69d9995701564b19482be485873cd76fe9cf96de3a724c066c2816eedc084287653119630ad4a8bc2a3feebc8f37cb1f16648a538913f337832044b739d06c7f0033f215cea5d1b25c59c39b9f4f0cfb1ef8c8e9442649804f49b8ffc7b99d72f4"], 0x0, 0x0, 0xff, &(0x7f0000000380)=""/255, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000780)=r3, 0xae) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0xfffffffffffffe33) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000002c0)={0x1, 0xa1da}) recvmmsg(r2, 0x0, 0x0, 0x41, &(0x7f00000001c0)={0x77359400}) getpeername$llc(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000600)=[0xfd, 0x8000000000000006]) socket$netlink(0x10, 0x3, 0x4) umount2(&(0x7f0000000000)='./file1\x00', 0x1) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000700)) 18:05:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000d80)=ANY=[@ANYBLOB="a0d640b64ca38246f6d7c9f29b9fca591c6421a0b4a2003cfd79a93fe64bf0a208790fa733ca6e0b060162387081b695df5ecd62abc267488345930940c9945bf2c6cd0eded5e62ebe57b8d7a13dab1e20b455c51602c8438b16b1c244327cadc1e9f8ab80bb6780458896ffdf42ecbb783c6b219eee1da8ca70d63d42b05865baff700bd45800968162ef72ebcf10cb"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0xaaaad9f, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/uinput\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000100)={r2}) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) accept4(0xffffffffffffff9c, &(0x7f0000000cc0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000bc0)=0x80, 0x0) connect$can_bcm(r2, &(0x7f0000000d40)={0x1d, r4}, 0x10) socket$inet(0x2, 0x7, 0x85) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000ec0)={&(0x7f0000000000), 0xc, &(0x7f0000000b80)={&(0x7f0000000e40)={0x78, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x0) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792efeb674683100000000ffffffffffef00"]) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc01000000000000, 0x0, 0x0, 0x0) 18:05:14 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000140)={0x84, 0x2, "6af781cff20098e26983be8769a693246da5b34fcf1f28ae0786ecd7283c3c3657e8e88cd03c75e5c549936fa4334b654ab9a053734c4930b090e9155c24a3efc77ca341b8142413326811cb1482f13c452a3c8b9dc8c0849bfa7231e3f5d317eb440de47f44fd4798636efa2cbf8fc8d66fa2657b7abe981750b308"}, 0x100) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x5c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x48, 0x11, [@generic="e2abb4ec7645192056d52f76aacc17fd28d66a75a08d136f699d897bdabf4fd3c08e579e5253c2081c92cacb9693e7bb692f4ba15133ce6266b2a62bbacd9d21aa"]}]}, 0x5c}}, 0x0) [ 682.922095] input: syz1 as /devices/virtual/input/input1271 [ 682.949281] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc02000000000000, 0x0, 0x0, 0x0) [ 683.100987] input: syz1 as /devices/virtual/input/input1272 [ 683.174653] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0xae, 0x9, 0x9, 0x4ddae39f, 0x24}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x3, 0x2, [0x0, 0x4]}, &(0x7f0000000140)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="09636da39fba4d863bc17c4fd422e71941cb89fe66fc8188fb3fea1f3cbce776836ddcb4aaddea7596732607d0cbc10e45e81a4b", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) dup2(r0, r3) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 18:05:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:15 executing program 4: clone(0x2102005ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') exit(0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)="84c942cca011dddc8604020265815e9227b9881bcfc7d045029966197d870b5bbf402ebcfe52f13442f35792bc1a60ce4252c3de12f2f5dabf068e01e16406928b71459506ec98a05cf681a80a857cc9568bdd3b1607a8ef62f997409d919871cc00045a218edbc6d34c29b29ea7fdf7239918c49f2c778247625f1633094287cecf70e09bf64b0be4a1615ffe5dab172ae8541d1c533f1d98f6311907398acda04f233d9917f2e5fd51101dc45367530a6c25b9f1f5312f66a098e9bf54840dfccd0efd0096c08e2d5fc489fb7a453ad150de476084efbb1fa95f46522b568a69b631dbd3009f974144cf07785e16", 0xef) wait4(0x0, 0x0, 0x40000000, 0x0) getdents64(r0, 0x0, 0x0) 18:05:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsc', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc03000000000000, 0x0, 0x0, 0x0) 18:05:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) personality(0x510000b) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000240)={0x38}) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="724096f7fa9d766beb04e476e97d29803528160b0937ceec233373e5aefd786ed5bdd91f2450ad055edcd45112d2abe07cb9a965fa8f924ca9158634ff430f9acd2b7deb36a392a72237eacb48245b6fa0a7ddd722323360662dfd220b65151147a000a384ff9fcaf37af116"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x9a], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) r3 = dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000cc0)={{0x2, 0x9, 0x70, 0x80}, 'syz1\x00', 0x26}) shmget$private(0x0, 0x1000, 0x1000000000000, &(0x7f0000ffd000/0x1000)=nil) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000e80)={@null=' \x00', 0xd, 'ip6gre0\x00'}) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000d80)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x24, r4, 0x200, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4800) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:15 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000180)='/dev/udmabuf\x00', 0x2) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x2, {{0x2, 0x4e24, @broadcast}}, 0x1, 0x6, [{{0x2, 0x4e24, @local}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e24, @remote}}]}, 0x390) r2 = memfd_create(&(0x7f0000000280)='/dev/udmabuf\x00', 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x1000000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000080)={0x1, 0x465, 0x0, {0xa, @vbi={0x965b, 0x4, 0x10001, 0x32314f5f, [0x8], [0x1, 0x5], 0x109}}}) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "9d856c8afdae8e6b076d069187b31087a14466e711b5783d7b3f43e564d1c60b4b5a6ab2e12d5746ac"}, 0x2d) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000006c0)={0x1000, 0x6, 0x4, {0x0, @pix_mp={0xff, 0x8, 0x38415261, 0x7, 0x5, [{0x5, 0x1}, {0xffffffffffffff01, 0x401}, {0x80000000, 0xffffffff}, {0xffffffffffff0a3b, 0x5}, {0x7ff, 0x81}, {0x9, 0x200}, {0x5, 0x35}, {0x100000000, 0x10001}], 0x7, 0x9, 0x0, 0x1}}}) 18:05:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, 0x0) 18:05:15 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, 0x0, 0x0}, 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x20) ftruncate(r3, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, 0x0, 0x0}, 0x20) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setfsuid(r4) r5 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x6}}}, &(0x7f0000000340)=0x84) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x60000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x3f00000000000000, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0x1ff, "4754142bcde2dbb316a9600226e10470d6dd68343d0c3904015dbf79985e1f18", 0x0, 0x0, 0x8}) [ 683.516808] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 683.555827] input: syz1 as /devices/virtual/input/input1273 [ 683.643315] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) 18:05:15 executing program 2: r0 = socket(0x10, 0x2e74956a527b5dd5, 0x0) write(r0, &(0x7f00000002c0)="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", 0xfc) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 683.699594] IPVS: ftp: loaded support on port[0] = 21 18:05:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xf803000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x199380, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) 18:05:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsf', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 683.872701] input: syz1 as /devices/virtual/input/input1275 18:05:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x3fff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x201, 0x0) dup2(r0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x38000, 0x0) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x7f, 0x24000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x6, 0xa0000) ioctl$RTC_AIE_OFF(r2, 0x7002) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r3, &(0x7f0000000140), 0x391, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x4) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f00000002c0)) [ 684.035031] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 684.071218] input: syz1 as /devices/virtual/input/input1276 18:05:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) [ 684.157328] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:16 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x1000000) ioctl(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x9, 0x8}, 0x4}, 0x10) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000300)={0x1b8f, 0xc, [0x9758, 0xfffffffffffffffd, 0xfffffffffffffff8]}) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000080)={0x9, {0x40, 0x6, 0x0, 0x80}}) r2 = openat$cgroup_ro(r1, &(0x7f0000000840)='/\x00~W\x98\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xbe\x9f\xecc\x03\x9b\xa5\xf9:w\xfb\xb9\xb2\'\xfdJ\xcf\x19\xc7\x0f4d\x9a\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc2\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xdd\xe8\x99#\xe3\xb1PY\x1f\x80\xc9\xf3\xe0H\x1c\x9e>\xcb\x81\v\xbf\x9d\x8a!\xf7i\x9f\xa9\xc2/\xc4\x9f\x12,\xa7\xb9\xa6\x8fF\x97\xfb\x8a#@f\xff\x0f\x00\x00\x00\x00\xb1\x9cm\xd8\xe5b\x96e\xc9\xb0\x91J\\N\xe5P\x9c\xb2@\x96\xcb\xdc\xb6O\xbfK\xa6\x889\x15\xed+\xe5\xdd\x9b&\x9cp\xfffu\x9c\xc0#\xf8\x14I\x94[\x02k]@\xe8E\xefo\xe2h\xf0\x10\xc4N\xc5][\xed\t\x13\x93s\xcf\x87W\xb6~w=\xdb\x12\xdeL\xe0\xd0\xfc\xc3\xff,\x0e\xc1\xde\x9e\xe4\xcf\xd5\t\xe2\x96\xe0\xe0Q\x91#\xaf\xe0\xa6\x00\x04[\x9d\"d\x16AMX\xbfj', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x80000036) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000200)=0xc) r4 = getegid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x40, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@permit_directio='permit_directio'}]}}) 18:05:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfc01000000000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="277129e708c35832dceff0f75a0b6d74d707a8e02780b307ff9be0b511b982411089c63b80d21439f5c612224cb1a174259c0db272300be54f30cdf99130fc169a744cb4fc7ff3a17447cebd6b5ebf631bc39978f1a8fa745607f4d1ffde6841d716fc9fb91cf7e432f48832062e14a02e8b3c3dc9b636c181c3ed93d9156ee7ee898e41bfdf6cb94ad35457ef277e48094b90a2967e6e5a2f171f4454d0"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x3f, @rand_addr=0x5, 0x4e24, 0x1, 'sh\x00', 0x10, 0x101, 0x34}, 0x2c) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 684.441107] input: syz1 as /devices/virtual/input/input1277 [ 684.484593] IPVS: set_ctl: invalid protocol: 63 0.0.0.5:20004 [ 684.495970] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 684.568784] input: syz1 as /devices/virtual/input/input1278 [ 684.603169] IPVS: set_ctl: invalid protocol: 63 0.0.0.5:20004 [ 684.805462] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 684.902892] IPVS: ftp: loaded support on port[0] = 21 [ 685.531791] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 18:05:17 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, 0x0, 0x0}, 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x20) ftruncate(r3, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, 0x0, 0x0}, 0x20) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setfsuid(r4) r5 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x6}}}, &(0x7f0000000340)=0x84) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x60000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x3f00000000000000, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r6 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000040)={0x1ff, "4754142bcde2dbb316a9600226e10470d6dd68343d0c3904015dbf79985e1f18", 0x0, 0x0, 0x8}) 18:05:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsg', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 18:05:17 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x1000000) ioctl(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x9, 0x8}, 0x4}, 0x10) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000300)={0x1b8f, 0xc, [0x9758, 0xfffffffffffffffd, 0xfffffffffffffff8]}) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000080)={0x9, {0x40, 0x6, 0x0, 0x80}}) r2 = openat$cgroup_ro(r1, &(0x7f0000000840)='/\x00~W\x98\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xbe\x9f\xecc\x03\x9b\xa5\xf9:w\xfb\xb9\xb2\'\xfdJ\xcf\x19\xc7\x0f4d\x9a\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc2\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xdd\xe8\x99#\xe3\xb1PY\x1f\x80\xc9\xf3\xe0H\x1c\x9e>\xcb\x81\v\xbf\x9d\x8a!\xf7i\x9f\xa9\xc2/\xc4\x9f\x12,\xa7\xb9\xa6\x8fF\x97\xfb\x8a#@f\xff\x0f\x00\x00\x00\x00\xb1\x9cm\xd8\xe5b\x96e\xc9\xb0\x91J\\N\xe5P\x9c\xb2@\x96\xcb\xdc\xb6O\xbfK\xa6\x889\x15\xed+\xe5\xdd\x9b&\x9cp\xfffu\x9c\xc0#\xf8\x14I\x94[\x02k]@\xe8E\xefo\xe2h\xf0\x10\xc4N\xc5][\xed\t\x13\x93s\xcf\x87W\xb6~w=\xdb\x12\xdeL\xe0\xd0\xfc\xc3\xff,\x0e\xc1\xde\x9e\xe4\xcf\xd5\t\xe2\x96\xe0\xe0Q\x91#\xaf\xe0\xa6\x00\x04[\x9d\"d\x16AMX\xbfj', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x80000036) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000200)=0xc) r4 = getegid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x40, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@permit_directio='permit_directio'}]}}) 18:05:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) read$eventfd(r0, &(0x7f0000000240), 0x8) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) socket$inet(0x2, 0x2, 0x8) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) [ 685.829640] input: syz1 as /devices/virtual/input/input1279 [ 685.877437] IPVS: ftp: loaded support on port[0] = 21 18:05:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000000000d000040050000a900000000000000000000004000000000010000000000000025000000fff0ffff04040000000000000a00000006ed"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x186, 0x0, 0x8000403000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) [ 685.910352] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x80035d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 686.096272] gfs2: not a GFS2 filesystem [ 686.098600] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:18 executing program 2: wait4(0x0, 0x0, 0x80000002, 0x0) link(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000440)) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000001c0)={0x1, 0x5, 0x200}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000480)) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x605) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1047, 0x9) rt_tgsigqueueinfo(0x0, 0x0, 0x29, &(0x7f0000000500)={0x40, 0x9}) execve(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x2a}) 18:05:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsh', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 686.262032] input: syz1 as /devices/virtual/input/input1281 [ 686.350924] input: syz1 as /devices/virtual/input/input1282 [ 686.592587] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 686.756427] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 687.138318] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 18:05:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket(0x11, 0x5, 0x9) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r3}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x69, 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x3000}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r4+10000000}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000004000000000000900000100000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) 18:05:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 18:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x0, 0x6}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:19 executing program 2: wait4(0x0, 0x0, 0x80000002, 0x0) link(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000440)) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000001c0)={0x1, 0x5, 0x200}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000480)) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x605) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1047, 0x9) rt_tgsigqueueinfo(0x0, 0x0, 0x29, &(0x7f0000000500)={0x40, 0x9}) execve(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x2a}) 18:05:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsj', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 687.425624] input: syz1 as /devices/virtual/input/input1283 [ 687.435210] gfs2: not a GFS2 filesystem [ 687.519816] gfs2: not a GFS2 filesystem 18:05:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) [ 687.613142] input: syz1 as /devices/virtual/input/input1284 [ 687.650009] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='wchan\x00') sendmsg(r0, &(0x7f0000000e80)={&(0x7f0000000480)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @multicast1}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000400)="e2c703532c20", 0x6}, {&(0x7f0000000500)="0d46f50ef18aa7ada973a2c20b691dc80d914d072c13891596df7301c9e396704f8c3c0cd4198200191a16c3aba2ff05a0af19557e283afb73d16c62a4dd934e88f21270817b3d6787aae5a2901ccccd27d5da30ac44bd6fa463d1b36a642fae160d8c84a90197b393fe8564dc6901ea402953b5c733fe3bc8e2a656a560f04cc041deb4906a395d0e35bccd18b80e077f0e3dfd5f1f4060dfd9a370959dede0eead840b886f3f233fba3f7374b63fd3e6003ac4379b5da1f24bc49d2b703035e6b309841f48cc0a805f32a62e98", 0xce}, {&(0x7f0000000b80)="9c5206b612000b2a79381ff97d649dce8c611d6244c0e8d73818f942f26c03adb09b97885d6541367ac8df1b17959d24cde136aac4d51a1cbcca664f6ca18b4333e303c163bab393f8a36fbc9d9919dea8059abb29937db70a2741bf354256d36b4fd684", 0x64}, {&(0x7f0000000cc0)="746f210a95ab81684778c615f4384431dfa5c6f594ab0ca8efb77e4ead4a327429096dd3366a313bb5155f68716b232a29ef36250a5a8cadf71f591c274080050ec316a4a831395684fc155ffbc96e31d7b7686b743c7cc8419de3398edaffad0d09e75d5bb45f382c157a190b848c452683fd3d3e530d6d0d93c4803f", 0x7d}, {&(0x7f0000000d40)="d01d79fe395b871e9742455b86a0e677ed5f833d601d2f1afac74b6ed4409ce61dba79baf5fb8513413d562dc28675cb20d7893479d1fa6e0a53b2f551af629587a915aa60b05afc6fc15195ba5a9c23f00c420b7335333775590ee5828f359ab1aac00813012f6fcfd63eefa8578902c87c4dd82b5214fe0ad22341974aceeea6c055bfa2556e1beac21386bb12f53ca973d527e6af8e3dbfb6e70a18fb1b0c3533d2e6e47f7a1aefe4c570d955f8dbe8cccb793c53323fcc", 0xb9}], 0x5}, 0x20008811) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) r3 = dup(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000000)={0x0, 0x4, 0x8, 0x0, '\x00', 0x81}) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 687.817478] gfs2: not a GFS2 filesystem 18:05:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsl', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x20, 0x2e, 0x1, 0x0, 0x0, {0x2}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x220440) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000180)={{0x3, @addr=0xda8}, "4e8a1a58747368a1a15b860ea0b93b6554fcd44a47ebf434bdda29a9a936b35b", 0x1}) [ 687.837774] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 687.943486] gfs2: not a GFS2 filesystem 18:05:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 688.003947] netlink: 'syz-executor2': attribute type 3 has an invalid length. 18:05:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) [ 688.048863] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 688.260756] gfs2: not a GFS2 filesystem [ 688.345907] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 688.381742] gfs2: not a GFS2 filesystem 18:05:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket(0x11, 0x5, 0x9) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r3}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x69, 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x3000}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r4+10000000}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000004000000000000900000100000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) 18:05:20 executing program 2: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@jqfmt_vfsv0='jqfmt=,fsv0'}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="05000000070000000c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000002380)={0x0, 0x0, 0x2080, {0xd000, 0x3002, 0x1}, [], "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", "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"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) 18:05:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) 18:05:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsr', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) 18:05:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 688.799987] gfs2: not a GFS2 filesystem [ 688.811188] REISERFS warning (device loop2): super-6506 reiserfs_getopt: empty argument for "jqfmt" [ 688.811188] [ 688.842370] input: syz1 as /devices/virtual/input/input1287 [ 688.889206] gfs2: not a GFS2 filesystem 18:05:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) [ 688.992049] REISERFS warning (device loop2): super-6506 reiserfs_getopt: empty argument for "jqfmt" [ 688.992049] [ 689.020951] input: syz1 as /devices/virtual/input/input1288 [ 689.023464] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x1, 0x2, 0x4, 0x3}}, 0x26) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/uinput\x00', 0x803, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x40004000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffff9, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x4, 0x3, 0x3], {0x0, 0x989680}}) 18:05:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfst', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 689.203163] gfs2: not a GFS2 filesystem [ 689.212104] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:21 executing program 2: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, 0x3, {0x1}}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup(r0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x20141042, 0x0) read(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)='selinux)md5sum[\x00', 0xffffffffffffffff}, 0x30) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r3) r5 = msgget$private(0x0, 0x10) msgctl$IPC_STAT(r5, 0x2, &(0x7f0000000440)=""/211) r6 = semget$private(0x0, 0x6, 0x1) semtimedop(r6, &(0x7f0000000800)=[{}], 0x1, &(0x7f0000000840)={0x77359400}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000780)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], 0x0, 0x800009}, 0x48) getpid() connect$can_bcm(r4, &(0x7f0000000c00), 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) fstatfs(r2, &(0x7f0000000680)=""/228) connect$bt_sco(r4, &(0x7f0000000140)={0x1f, {0x7, 0x7, 0xcf9, 0x1, 0x3, 0x1}}, 0x8) 18:05:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 18:05:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 689.572515] BTRFS: device label >ÐÕûbÓòí.ê$€ÖRT½k—G`ƒ1@€>Ó ±ê …™Ã [ 689.572515] Ó+cˆÊHæ devid 17487635432702809553 transid 756082810144684242 /dev/loop2 [ 689.606943] gfs2: not a GFS2 filesystem 18:05:21 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x10001) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) utimensat(r1, 0x0, &(0x7f0000000240)={{0x77359400}}, 0x0) 18:05:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000f40)=ANY=[@ANYBLOB="0c0f86"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000003c0)=0xc) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000bc0), &(0x7f0000000d80)=0x8) getsockname$packet(r1, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000ec0)=0x14) bind$packet(r1, &(0x7f0000000f00)={0x11, 0x1, r4}, 0x14) ptrace$setregset(0x4205, r3, 0x2, &(0x7f0000000b80)={&(0x7f0000000cc0)="0b22ddf502a963b37b019c46568ff0e38b6bef86865833a527bfb998b10f581bcb85599ce421532cb67153f03e7c4cb30ba1ec91cfee1638c8ff992253850bbd4dd2e786d393088bd48c3b8816d66d11e7d29dd9b50e7838c430deb1354bf79e468a09b0f5f827b409422f1c6dc8117d53ccb446cccc67a488c839aeb855af7abc39a1bbaee7416c8fc6c6e2e2ab63389c6c6fb7", 0x94}) ioctl$TIOCCBRK(r1, 0x5428) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ptrace$setsig(0x4203, r3, 0x1, &(0x7f0000000e00)={0x21, 0x707, 0x7}) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) finit_module(r0, &(0x7f0000000100)='vboxnet0keyring\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f0000000000)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 689.733726] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) [ 689.796698] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 689.826962] BTRFS error (device loop2): superblock checksum mismatch 18:05:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000040)=[{r1, 0x4201}, {r0, 0x2000}, {r1, 0x80}], 0x3, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0)={0x1f}, 0x8) setrlimit(0x40000000000008, &(0x7f0000000000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) [ 689.861674] input: syz1 as /devices/virtual/input/input1291 [ 689.877693] BTRFS error (device loop2): open_ctree failed [ 689.884299] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 689.904013] gfs2: not a GFS2 filesystem 18:05:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 689.954590] input: syz1 as /devices/virtual/input/input1292 18:05:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsu', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) write$binfmt_aout(r1, &(0x7f0000001600)={{0x107, 0xffffffff, 0xffff, 0x3b, 0x1c8, 0xfffffffffffffffe, 0x21f}, "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", [[]]}, 0x1120) 18:05:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xb, 0x0) [ 690.208149] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 690.244920] input: syz1 as /devices/virtual/input/input1293 [ 690.253935] BTRFS error (device loop2): superblock checksum mismatch 18:05:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x1e, 0x0, &(0x7f00000003c0)="e460cdfba82170742307070088caffff0a9386dd005798a939b8b8803b72", 0x0, 0x4000000000040007}, 0x28) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x77d, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) bind$packet(r2, &(0x7f0000000340)={0x11, 0x18, r3, 0x1, 0x3, 0x6, @broadcast}, 0x14) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x8001, 0x7, 0x6, 0x7, 0x0, 0xbf, 0x4, 0x0, 0xffff, 0x7, 0x10000, 0x7ff, 0x4, 0x82f, 0x5, 0xffffffffffffffff, 0x3, 0x0, 0x800000000000, 0x1, 0x526, 0x0, 0x3, 0xffffffff00000000, 0x2, 0x8, 0xffffffffffffff81, 0x80000000, 0x3, 0x80000001, 0x94, 0x0, 0x9, 0x0, 0x10000, 0x100000000, 0x0, 0x9345, 0x7, @perf_bp={&(0x7f00000000c0), 0x7}, 0x10405, 0x1ff, 0x16, 0xe, 0x80, 0x6, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x4) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000400)) finit_module(r1, &(0x7f0000000040)='em1(systemlo\x00', 0x3) [ 690.374091] BTRFS error (device loop2): open_ctree failed [ 690.391016] gfs2: not a GFS2 filesystem [ 690.400584] input: syz1 as /devices/virtual/input/input1294 [ 690.418562] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:05:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x6, 0x20000) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x1c0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000020000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000008060300736630000010000000000000000064756d6d793000000000000000000000696662300000000000000000000000006c6f0000000000000000000000000000ffffffffffff000000000000ffffffffffff0000000000000000d0000000d0000000000100006172700000000000000000000000000000004000000000000000000000000000380000000000000000000000000000009ff70001000000007f00000100000000000000000000000000000000aaaaaaaaaa00000000000100000000000000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff00000000"]}, 0x238) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000540, 0x0, 0x0, 0x20000570, 0x200005a0], 0x0, 0x0, &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'team_slave_1\x00', 'gretap0\x00', 'veth0_to_bridge\x00', 'gretap0\x00', @broadcast, [], @remote, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffe}}}}]}]}, 0x1b0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x220, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x4, @media='ib\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x5a9d4de1ce9cdc4a) 18:05:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsw', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 18:05:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_elf64(r0, &(0x7f0000000cc0)={{0x7f, 0x45, 0x4c, 0x46, 0x75c4, 0xfff, 0x7fffffff, 0x6, 0x7, 0x3, 0x3e, 0x100, 0x364, 0x40, 0x272, 0x100, 0xffffffff, 0x38, 0x2, 0x0, 0x0, 0xa645}, [{0x5, 0x4, 0xfffffffffffffffd, 0x8, 0xecd6, 0xffffffffb0167c37, 0x1, 0x9}], "3d81ea940585cdeef1169afdcd6860f4524e115b34400623d1f15de637b368b12e10012fddd03737e89005dea4079c29ada55532c2e8a637bf307ad0f8c9bb7746a44f638fba515cb95f743331803d7ec3a0168b4777e50e850576970fb1af7657f0dd6d3ec07f92675f98b19ac686bf02904a3ab9fe8037d94e626cc52647ab2d39f564403fb5dbe579ada51370c99b4db48d247697", [[], []]}, 0x30e) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000001000)=ANY=[@ANYBLOB="ea443f52a7c04480172069f2b40300bfec5ea83812450000000000000000000000000000654ad9d7a5f3d46feeeb7e30b507af8126322ba5a30e4ff0f0da9593d5409682f069259c44e272ebe5a0fa1e9557184a2462a585e9339bf867f7cfb596e3ab4f8336c60fffd000347d7f665f474687b484530bad4f497a361e19cf0c8655feacd4d467ae5b71fd6115e5370f81b192ee0ec255307789e1db36e4498493ac3aae7b341d6bbf27c700d14081d1cd373bb87c2d80591fab0b9bab00a13d08a8d65e7284692c0782d1fdddf1f382221ee50cceda01afbbf01f48f95e56af06c4242bfa54bac4"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) r2 = add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000001100)="e22aa8b18bcf2cd4011269bfa272839e8c34a2963f3284e1d63d6ac9085a413a2afa0847930ee1fbe4243caccc9409774db92995a4a17c58dd6b863a432dde56bc403786c4f5b4d4858619065ffb0f2dc1eca1498c34199f1fe01ea933fd33875ac3160b8a15e1c110bd032b5b539398dda2185d0cf8d86bd6bc8a9e9d04f0878e481534165c62cd0af2693ed900f2ae7e4ca9ebbcdd70a3a8890b8fbd916cdc2fed91188a8ab67d2b0c626bd1d47156d802011d5209051fcbbe5bd288f64958b1f1ddc28ae440", 0xc7, 0xfffffffffffffffa) r3 = request_key(&(0x7f0000001200)='asymmetric\x00', &(0x7f0000001240)={'syz', 0x0}, &(0x7f0000001280)='\x00', 0xfffffffffffffff9) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000001600)={0x0, @bt={0x9, 0x7db99a9e, 0x1, 0x1, 0x101, 0x74, 0xffffffffffffff00, 0x2, 0xabeb, 0x1, 0x7, 0x81, 0x200, 0x80000001, 0x13, 0x13}}) r4 = add_key$user(&(0x7f00000012c0)='user\x00', &(0x7f0000001300)={'syz', 0x1}, &(0x7f0000001340)="2c89ea59b137733d0336da0d01cf163ba62d82fac2f42ee2d0b600d88fe8f141ab114daeb77c2f6b0ed1531959182dd2053d64aa846e0d7095daa7d00ab9514dadae1b42312855437e4d", 0x4a, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000013c0)={r2, r3, r4}, &(0x7f0000001400)=""/32, 0x20, &(0x7f0000001500)={&(0x7f0000001440)={'nhpoly1305\x00'}, &(0x7f0000001480)="4785e1d309bdcaa48b7ed634223a1bbd733b1889b910ec875271825f99d2349abbfe5f84cfac8eeeb8330ad5b9cb0848bb6c5be8c8466b4f5fdf3387e1f1b4e559168847476d0411ff95f24a161023d1921e58d5d8300b7c8ec5b74eda5d27bc", 0x60}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000b80)={{0x8000}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) write$P9_RLERROR(r0, &(0x7f0000000000)={0x1d, 0x7, 0x1, {0x14, 'selfkeyringbdev!self'}}, 0x1d) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x6, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 18:05:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc, 0x0) [ 690.594038] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 690.686981] input: syz1 as /devices/virtual/input/input1295 18:05:22 executing program 2: socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x41040, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xdb\xf9\xbc\xe4\xb9\x00\x16\xf2f\xe3\xf60x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002900)=0xfffffffffffffd4f) sendmmsg(r3, &(0x7f0000002b80)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x3, 0x1, {0xa, 0x4e24, 0x2, @remote, 0x3}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="50791698c2a12b50f7d4e0980d18d7c5111599d07a8baa2e6458dc1f919bd61ee6799b631f893fcaf53087f0c6a9fe06f9bf50e3267e5b31303847f9a0ce2530d534ffdf2e6a76dbcd738ed641ef83540cb8d8c7724502d1", 0x58}, {&(0x7f0000000100)="88caa18f9f1b97133a5caebd37a8b12a5d174531bc944832f1e7aeef4655df855d8641baea6718fe9251d7d0af3380982c7cbbe28befb148362b6f", 0x3b}], 0x2, &(0x7f0000000180)=[{0x90, 0x11f, 0xb2cd, "504c535939239d2463e937de67f204a6ef7b792e2078f9502919d49f4b24107f4c54dbaf629956d6e022845267a62ffddac920f017545a4e8d16df8a1f30b46d252671bf9fda311b592139215cf5979e2676239860c64f5972398cf8773d97da5072ff1c745990110c103a22ae9cda7d023493ce0effc4b2364eb7"}, {0xb0, 0x11, 0x9, "51af1461edd912e515bd23ce37083643f84343037192ca578abbf44cd324144ec8cae6a55e0dfc0b471514b8275feb035e7edb37704143b772b83c25139f0c39d5f7993324680d7153138335d90b4564782cdcbd234c0a52597cec922260f0de55a4445d77c45e09961837b2ea4f7246ccdd9c911dc186d4aeee92afc4283d0e366362b3e3dc1a05fd35bd07cc132719f3ee80b0b7261aecbb05"}, {0xb8, 0x195, 0x0, "36966a897490b8b55a1d1288734113a67a0f40e28b039e10da11a56b3f7b572947b44893fd70d776a8fe3201b90122113ca621f63931b8db70b057fc6ef93d0b997ad9c04efa300ad9c32dfd3d7e7e7951930b70f6c6c5f632c07369336328c2822fcbb73d0b69c0b8d6bd53b73f1647e1dfdb299a5712227048eb3e1c73c727c448b06bdf7c65c7de62a946895ef4e028ae21d1fe25fd19f84e56c31a70a80f4fd8cdc0"}, {0x60, 0x117, 0x10001, "dfd8113f23c80f033c7f7d3a8ba1758c614890c513548373c8eda02c7d24ef79a26ea47ffea4a40fd71f93e1baea775d5154c859a6499ebe61a114c2b72892d54dfed0bc6126df685fa6"}, {0xb0, 0x116, 0x1, "a283b8f8487ead2242283d6213266bff7f6afd9148824f4927555f1aa0825b7c247d33bf7aedd6027023a8c30494e656a9fa14cd621c3997681516e2959c6f675131d5c0d970d10e44611b18c62d9bfd5dca60b0a34f8190e524a84f6ed591e7de1a51814e8a48bd835876ef55f229fdab44f2d42fdf8dd99b0bde8005514c32b8d971caba24cb15eb05be9e98226afbf1be58f06eba81ac0c90baa5b05665"}, {0x80, 0x3a, 0x1, "4536f28ee78982840fa2c7d34892cf4948c0c4a93a53151c0a8266cb819607d708f67fed49b17696588ffaf9e281c5f9e74191dd16d88d7103fdd9dc14501bd6069af60f8afc5e8e9e503f7dc3276f1268d63b5e6ce0936248e93ee402b469f9c6ecb7d385175546f5"}, {0x70, 0x116, 0x6, "5ff04d6398b1cb5c078fae0a0823f716e80fdfc9bf6ab388dfe6a35707db00a5e1b08f18bcff4a977bc484883625536e463a904ad7db22b7287c9e4d7f79b37af886a13abd54b2b8e77239179095366034e931f9d82ff8b82bf6"}], 0x3f8}, 0x9}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="620074534325d5e9e0afead8b2ff763f83050e2889c8c6291d0820847f985fe71d9a05cb8285eeab38ff265e23c616a71d2bc266bd5114b808a32bc766be452495ec45c879852600d1e590299f9fd3d4ab28", 0x52}], 0x1, &(0x7f0000000640)=[{0xf0, 0x1ff, 0x8, "5e37f1a3406cdfb9da0ff0b3af14fd8a8afb4c30a02fc0c3e65572c4cf75b951410facf83a265972b443d9853d44f2d38511f941208232a38467624434cda71b5949ca3bdf5ead0934dd4ad892bb0717af70011666ce9de9dee28d466133911911fd279e48446cca932938b6fe8de879617076e3232bf5a6f094d0fda0f8ea795edbb071fb4b6fc2a2f0dd0bac0c3a3dbfaf4930f48860b8eb967ad56c8d76fdac2b78a5e4c28f76c48f8d12536aa80cfb8820a5420f8149c401ba479be6a7d436e4e863389738626a3c9c46c5fbe47a64667b25d56f3b1e24cfad"}, {0xd0, 0x11d, 0xa1a, "b06e224030389ca964b4d96df16eaaa5f11f076301b0458576d6b2f4d4bd6bd752c3241f9ab628605ec118eb4994b4a10915e1318768a5d1d41b9805fad8e45a4e51f9c9f409e3f58b0a6fa23279ed13d95260fc55ebdd7ad8275a3a9a0355abf5aa6300ab5343acbda458944bc6bb60b11f2c0a15894c156681a5a384d5f11842bfc1306a517aeac5b757d4a0ce87a49791ef3162a05479988c24bb93a8675615f53fdfc026f1217ed902281c01e02b6e44be059ac63ff83afdac"}, {0x40, 0x110, 0x6, "858c121bfceb9e901ca63f1d2a1069f3a3774ca52e7934d4b70a3c4b9273c1c98c5f6086b0b811ebdd62"}, {0x50, 0x0, 0xfff, "6605727e58b8df8b74d787b4700ad498e2fd5d5609603b0e136f9694745d72924463c445a46e21e47425168b8b780baf94dfd3795456cabe6f5d2aea"}, {0xe0, 0xff, 0xa5, "482640a49744baba89ddbfc3cd6097297fe33e3e916d8e09f55cef00ccd119c0e8847a9f77203de818e1f65906d833aed42386c2389df783189c5e32a33b796b75aeaab70661b9ec4527458bf9f69ac18dfc110240164ab5111f2a0b187a54c4e9896475425ce174fccb30a823f5ec9c23bd1199298a62d17f2be2370666da72e6765c6e759bdca5c7d7e68b3a5d1a078d30450a27ac2a5a6068b631b9545d3dab1389cb631a5b70d0232025688808dc437cec1fa53dd15cd2207ab3dbbb6d6e4abbc00f467c7ccd3c9d"}, {0x88, 0x10f, 0x2, "83b22d16ee962859c2ece31bb3a5b7206b1fb5199f81138e27c600eb0a078c495cfa74eeb1a3e8f6490f159a1bc6a3eac2906641128548b5e50ef7fff772d72285b87f4f9617ff68bb65851c4898a1246e762d16f2bdcfcae16f76760ae0f0e87c4fbca6b4becbd6ca1772b08571f94320"}, {0xd8, 0x84, 0x9, "58dc828056df3120ac328e08dd2d3f64dd51e81387c5050b230cd5bf81c15c85068e2d174985ba6120d7ba9b5605caac79a0e24787bdbced6d361f75d7c02efdc2c78b92138171f8c2b143276c7b6b602c765cc74e60af5ba197f012b73d57ff41f8f4cf9b44ec6bb794f3fdf4deb3ced0df1dd2835cad46975e4f35d54997b4bce6dcb309c05ad68575b7cae9f6eec4af53cc51662df70fc54813da34b975692c0146c40eaac4e26c5b4719b6e84632024b7e7dc856d5bc5bfb9e6ab4d3d4acd2531b9e16391d"}, {0x50, 0x116, 0x8, "c7d68b6b495fd6f6c353e879155cbec5c5c02b5b0738b9e3d4a0a93721930f85dd975b7f06067307c8c756489e9f4f1f6d3d6ff5cf232d3cb5760aed066f"}], 0x4e0}, 0x8}, {{&(0x7f0000000b40)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x6f, @dev={0xfe, 0x80, [], 0x23}, 0x1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000bc0)="287505cd49f55ae5f04fbbd409646a762d3c3a3ccb87d2b2aff66b6cf87562faed0459d851a0c6a657a80f3cc356d15306e17d331087484d2c90be2d9d02a8bb6d03dae41c8537a868de7b180c4ffe8f2ecc520f7736f5b22b3c8fb174304cdfb7e0fd967054a43a20a97b906672c9c669ad594dda0ddf3ddc2b6b39db51cf3adf8ffa6ae8fb138db7cdbfe567af8f1a409ed65e26809a8b37571c987bc52e6cec448edccd12030cb1e911d2d749a2e07965e27c72576ffd7421bcc549591071e89ee7c86201e7f57a6a3e3fe7ae65b9880312e092b4937ec7fc53a2ec7ec8", 0xdf}, {&(0x7f0000000cc0)="fdcc46b3f7c4727dbbd4830680bd439f71f0c03c85898cebd0fc91f004a4a9a8679a0e38b98152c7bb725dc67e54659a6e49edc256583b3680437cd1bc47f9ae931a6dec330440b7d398ac5d52b3e3008b1edd5dc4d27b172ad199485c5f811d2b03ee71a81f07c8e7c4f8497c499db48a98a109f26ec8deb63b460a11c51bc0dfd4806ff8a6f653a90a1cd55dc23b7e2e5d46ccf63b", 0x96}, {&(0x7f0000000d80)="b9e765b3c2ba39489e3945c57330d92049eca921ae58b21256172e9272ddeca3087c1c6b75f6f3a797b8fc060f4301401287407481383daabbd4ddd74c1f8c1eca474075a3263d748d4055c3ca448dd7a50b7b5c5bef65673e9e1e5ce394e41f", 0x60}, {&(0x7f0000000e00)="81b8d427194cfea21eaefd40870ed72a459fa185df5ca23d774aadeb92179248cc41e99fa7aaaaa3102532c30c640c17ce9bff29ae6d0d160081d79b655ac17c34bcc35b6a91762a78cc63283cf01492f3e06ca36f8e92e2c79ac0ac7f75944d595a83af52517650f6f1d3adc7ab5fc6e724d633b01400c910b00fa35a97d19c28a4bea382d48dfbeee3bd83b2c09fb0803f02", 0x93}, {&(0x7f0000000ec0)="5b5221a89d61c0a1807ecf4ac6945680fe0c724ee43a70240fb9b9b9a4386c59268292f204ef07bd4c94648eb132962edc4ed7fa505804af587bab9a4249021ecdadaf324cd2b3b543d31f2c6135d41b107817f7f69b1c843c1107df51808b4e9a1f92a0f6afc6b3f6dab63beaead05039b2ac14b054c986c0a2adc157ab853fcc982e550519d802d3059631e32f62ad6fa6492834bebe6a60352846a7cb1c1a0119a08546ef8855bd1c88", 0xab}], 0x5, &(0x7f0000001000)=[{0xf0, 0x0, 0x7, "4d092735bcbfd53bfc460aa83fc8b6ca286edca70d766a6fb64289a73a177b81027b140b9df9f5a0128dfbda82dca4a9589c636b90cc3dcdbf4cb94a6378ca15b75d50f08e3e2cec7097e45329193dc62e915cf87aed95706a978f57625f70fa6dfed232b24b51b334ddc2deed650e0b096c6c183ad7cf3c5bcbcea29abaebb30007c8dd02433cca3738cebd9fd906944bb96940c75b221d838ec654a585f5dcd08aa0965aaa90931ae706b3422b565504eaf0d3c218991fc5946092c37a17f9b35d17890eedfd41e77ecc248900535c46a32c18a4b5fe423e3c"}, {0xe0, 0x0, 0x8000, "6f8eeb368a46f369b5538806abd6d84f831b585c6fc5e4e5121e9494d11a78781ca226902fcbd8a05e0b27ede08adf0ae4d922399e64b9a67f50c5a253b37c489256c712f3b9d35425aa93134a4856f43da19f4ab59e210c46e808b66f6bff6bb97aaadbd54d3b22fedd24d734910cb4e9a8be639a0fb0b751562edbc0843d641d5d23024c5f29180fdfe68eba582db5629da32985d4b3b29b2cba6ad05390ee6e87e43c24db7fb13d1583859d306c9ca5c511583327b27a238bc634fc3aa9421d58cd78d5b06ff10745965c4f5aea"}, {0x10, 0x13f, 0x3}], 0x1e0}, 0x4}, {{&(0x7f0000001200)=@sco={0x1f, {0x7, 0x4, 0x9, 0x95bb, 0x28000000000000, 0x80}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001280)="fb6e336175e80443a9fb", 0xa}, {&(0x7f00000012c0)="e905d1d8c517b2b52ad00f6af37b0165da95d9d18a6f88556363edf25f42dbdf89f42892e88f8e4c37b56a19eed2ccb9bebf585299a7e9e45f78f40336b9", 0x3e}, {&(0x7f0000001300)="12e314f448738efd", 0x8}, {&(0x7f0000001340)="a063562368fcce3ec6d2f8223a53ab8a19d1e0c72738d82b2efe694ecb8a25a5046e434f796d1c7f9cb86891b3cf8d13658bf499419390e161a3c6f526aa02b030255f579056448456ce3be45d2c3c4631f66f3ef77b53cce0d58dbeabc89135a83c8651cbb8eaba5790f4b596d88dc264082d13cf6202b2952f810d36aea335ee540547baa788a4e7d2d6de814737e0be13e9c10d836682dc0e26c4e9760cbb64ecf4f59f7b7751bd1f0116217c0a3bacd741918bea20da850ec9", 0xbb}, {&(0x7f0000001400)="985e900262e469405ad6c2b5eb74cdc3efd4ff540ec4dff18e8c2ea2f8964360a4d5712b6764e0dd516e3514a8330135f8a855c27b3e1004ebb895e22eb854ee642a8e7daca7975c9beabfca21c3121819b52a65483b3686906310e04b713fdc793cbae4aa8126325fc50cb8de7333a4ac5e446827e9cfc933", 0x79}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="751987c8cf49218d583bc94115eff57195adc0f6fd236c566193cd14e3dcae47f24acfbfeb88df0aa8fe3a1fca2d4daf7a2b2b1ccb19caf5752b79169bbe6121c990b30d257c97c52886b9a2ddc68c039e787660472904f54d497c8515ca041238e0c9dbffdfc9db275fb1a766336352ff8cffb10e02309a25cbe2055ec2c0e24b9bb565e5822b1176fb7bf6116e133667b9b9f765fd55f16736ceb96a4d4d6a9a1430d16e1124beba25b340f46975bbf6bcd32555ee0fdb8aec", 0xba}, {&(0x7f0000002540)="7d6ad8494230d79991d0adcf1e2d82b9323d107df4961b15c43dfb2d8e4a423bca6f2c399ed90ae06d90af2aeff7fb19177dba0041303b3bdc0123557400e5604762a78c8bcefb503f61440ede748bbab441", 0x52}, {&(0x7f00000025c0)="7e83e5b71f29a7f98f7cc5d99f97b98655b5afd01d9ff21895268ce5fed97380359b3bf2dca111e7a2ed6852bd3c2e3338e6888f24d790f788c87e2a9f11a59d6324a481553e22f9795c2be0a2033184a959d9761dadc8ebc9", 0x59}], 0x9, &(0x7f0000002700)=ANY=[@ANYBLOB="18000000000000000000000002000000b50c6ab88326a327e8000000000000000a0100008b000000749192b10d03ee994b0b5c2578bdb37a7bea63893857d8095ea69b31f96868e884d1824e9e910392e4117f0ba0aa360d9d90582e3b6e0bf996eb266a50309c940cd8f182625e01a9bf9caa3fa6e86c629532b4fdbdee86d4b6505c0027c7f2c6bd3379809c92a8ebad576fbdc965f6e200cbcb87cf6740f2a4f43ec79f13c520e123dd133131285da3481c60a99dd77aaacb1a0e3094b7bb1ab18592f56bc08f53806f5e214a97b0973e532c94d9ab08aed757cf195846392d9a229706c62ea8deda80fcfe6e182d5010bd30e2c992a8f27d0468e5142a00a00000000000000009010000ff7f00004c205237b0f27aa67d45cc7f409500ac9f1a178214a7c9702175adb0b3468a82b07453a1ddf3f9d40a4333d7b853ed0f50f3d3d693a1a67088f4eba0436c1c59b1f08cd7cf4e6aa6d0a02647b2e46e999c8660d671cd6de3f149e7c80ae8b403c3bc803afa0aaba4ee560476fb7e9a6a9ab164adfab60fa51ed5511de3e859a6a1c83420a840cc1b4db1f28efdc18000"], 0x1a0}, 0x7}, {{&(0x7f0000002940)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="3d33a147eb7b7459343ddaed0e78bb04fd64fe571f", 0x15}, {&(0x7f0000002a00)="d62f75c28e23f90ad28e4adf8a5ae971bb77ace4dcbec9a303c7efd4891a9a7674697624ba5b3a2e8e3e22e2a48bfae769a0501e74f1a70733ad314629a26ea9b04bea8defb7a70868ff69ebb70b", 0x4e}, {&(0x7f0000002a80)}], 0x3, &(0x7f0000002b00)=[{0x78, 0xee84e6d63f74349d, 0x8aa3, "fe16be985534f2d56eb081d515da81642e1bc3ce411c6b3aef057874f7c64bf2dd320e99bdc8473a53f3be5b78a8431ced4eef327ba8da692c5138dff7650285fafef432c26bdba7eb6d481603fa24e350e3de4d70102c1ca8b4524745c26cca9693"}], 0x78}, 0x100000001}], 0x5, 0x40) [ 690.818830] gfs2: not a GFS2 filesystem 18:05:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xe, 0x0) [ 690.931279] [ 690.932937] ====================================================== [ 690.939253] WARNING: possible circular locking dependency detected [ 690.945570] 5.0.0-rc1+ #14 Not tainted [ 690.949451] ------------------------------------------------------ [ 690.955764] syz-executor2/2782 is trying to acquire lock: [ 690.961292] 00000000e3476e7e (&sig->cred_guard_mutex){+.+.}, at: do_io_accounting+0x1d1/0xfe0 [ 690.969980] [ 690.969980] but task is already holding lock: [ 690.976042] 000000004d869695 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 690.982819] [ 690.982819] which lock already depends on the new lock. [ 690.982819] [ 690.991129] [ 690.991129] the existing dependency chain (in reverse order) is: [ 690.998733] [ 690.998733] -> #3 (&p->lock){+.+.}: [ 691.003881] __mutex_lock+0x12f/0x1670 [ 691.008301] mutex_lock_nested+0x16/0x20 [ 691.012876] seq_read+0x71/0x1130 [ 691.016840] do_iter_read+0x4a9/0x660 [ 691.021196] vfs_readv+0x175/0x1c0 [ 691.025295] default_file_splice_read+0x50c/0xac0 [ 691.030667] do_splice_to+0x12a/0x190 [ 691.034983] splice_direct_to_actor+0x31b/0x9d0 [ 691.040178] do_splice_direct+0x2c7/0x420 [ 691.044838] do_sendfile+0x61a/0xe60 [ 691.049083] __x64_sys_sendfile64+0x15a/0x240 [ 691.054095] do_syscall_64+0x1a3/0x800 [ 691.058497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.064206] [ 691.064206] -> #2 (sb_writers#3){.+.+}: [ 691.069700] __sb_start_write+0x20b/0x360 [ 691.074378] mnt_want_write+0x3f/0xc0 [ 691.078688] ovl_want_write+0x76/0xa0 [ 691.083019] ovl_create_object+0x146/0x3b0 [ 691.087779] ovl_create+0x28/0x30 [ 691.091760] lookup_open+0x1332/0x1b80 [ 691.096164] path_openat+0x1983/0x5650 [ 691.100589] do_filp_open+0x26f/0x370 [ 691.104900] do_sys_open+0x59a/0x7c0 [ 691.109137] __x64_sys_creat+0x61/0x80 [ 691.113534] do_syscall_64+0x1a3/0x800 [ 691.117934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.123628] [ 691.123628] -> #1 (&ovl_i_mutex_dir_key[depth]#2){++++}: [ 691.130555] down_read+0x8d/0x120 [ 691.134525] path_openat+0x25e1/0x5650 [ 691.138923] do_filp_open+0x26f/0x370 [ 691.143238] do_open_execat+0x20e/0x930 [ 691.147724] __do_execve_file.isra.0+0x1966/0x2700 [ 691.153209] __x64_sys_execve+0x8f/0xc0 [ 691.157762] do_syscall_64+0x1a3/0x800 [ 691.162177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.167870] [ 691.167870] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 691.174207] lock_acquire+0x1db/0x570 [ 691.178520] __mutex_lock+0x12f/0x1670 [ 691.182920] mutex_lock_killable_nested+0x16/0x20 [ 691.188288] do_io_accounting+0x1d1/0xfe0 [ 691.192975] proc_tgid_io_accounting+0x23/0x30 [ 691.198090] proc_single_show+0xf6/0x180 [ 691.202690] seq_read+0x4db/0x1130 [ 691.206754] do_iter_read+0x4a9/0x660 [ 691.211065] vfs_readv+0x175/0x1c0 [ 691.215123] do_readv+0x11a/0x300 [ 691.219102] __x64_sys_readv+0x75/0xb0 [ 691.223517] do_syscall_64+0x1a3/0x800 [ 691.227915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.233604] [ 691.233604] other info that might help us debug this: [ 691.233604] [ 691.241721] Chain exists of: [ 691.241721] &sig->cred_guard_mutex --> sb_writers#3 --> &p->lock [ 691.241721] [ 691.252388] Possible unsafe locking scenario: [ 691.252388] [ 691.258426] CPU0 CPU1 [ 691.263077] ---- ---- [ 691.267729] lock(&p->lock); [ 691.270816] lock(sb_writers#3); [ 691.276781] lock(&p->lock); [ 691.282399] lock(&sig->cred_guard_mutex); [ 691.286708] [ 691.286708] *** DEADLOCK *** [ 691.286708] [ 691.292753] 2 locks held by syz-executor2/2782: [ 691.297405] #0: 00000000c4b231c9 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1b3/0x1f0 [ 691.305377] #1: 000000004d869695 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 691.312562] [ 691.312562] stack backtrace: [ 691.317057] CPU: 0 PID: 2782 Comm: syz-executor2 Not tainted 5.0.0-rc1+ #14 [ 691.324140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.333482] Call Trace: [ 691.336062] dump_stack+0x1db/0x2d0 [ 691.339692] ? dump_stack_print_info.cold+0x20/0x20 [ 691.344757] ? print_stack_trace+0x77/0xb0 [ 691.348998] ? vprintk_func+0x86/0x189 [ 691.352879] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 691.358233] __lock_acquire+0x3014/0x4a30 [ 691.362376] ? mark_held_locks+0x100/0x100 [ 691.366601] ? __lock_acquire+0x572/0x4a30 [ 691.370829] ? mark_held_locks+0x100/0x100 [ 691.375065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.380595] ? check_preemption_disabled+0x48/0x290 [ 691.385605] ? mark_held_locks+0x100/0x100 [ 691.389831] ? perf_trace_lock+0x750/0x750 [ 691.394066] ? __lock_is_held+0xb6/0x140 [ 691.398125] lock_acquire+0x1db/0x570 [ 691.401918] ? do_io_accounting+0x1d1/0xfe0 [ 691.406250] ? ___might_sleep+0x1e7/0x310 [ 691.410615] ? lock_release+0xc40/0xc40 [ 691.414598] ? perf_trace_lock+0x750/0x750 [ 691.418857] ? do_io_accounting+0x1d1/0xfe0 [ 691.423180] ? do_io_accounting+0x1d1/0xfe0 [ 691.427493] __mutex_lock+0x12f/0x1670 [ 691.431372] ? do_io_accounting+0x1d1/0xfe0 [ 691.435688] ? do_io_accounting+0x1d1/0xfe0 [ 691.440006] ? mark_held_locks+0xb1/0x100 [ 691.444146] ? mutex_trylock+0x2d0/0x2d0 [ 691.448197] ? __lock_acquire+0x572/0x4a30 [ 691.452441] ? trace_hardirqs_on+0xbd/0x310 [ 691.456774] ? kasan_check_read+0x11/0x20 [ 691.460932] ? depot_save_stack+0x1de/0x460 [ 691.465250] ? trace_hardirqs_off_caller+0x300/0x300 [ 691.470348] ? do_raw_spin_trylock+0x270/0x270 [ 691.474953] ? mark_held_locks+0x100/0x100 [ 691.479180] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 691.484294] ? depot_save_stack+0x1de/0x460 [ 691.488605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.494140] ? check_preemption_disabled+0x48/0x290 [ 691.499148] ? debug_smp_processor_id+0x1c/0x20 [ 691.503805] ? perf_trace_lock_acquire+0x138/0x7d0 [ 691.508725] ? kvmalloc_node+0x68/0x100 [ 691.512690] ? seq_read+0x832/0x1130 [ 691.516400] ? do_iter_read+0x4a9/0x660 [ 691.520408] ? vfs_readv+0x175/0x1c0 [ 691.524131] ? do_readv+0x11a/0x300 [ 691.527749] ? add_lock_to_list.isra.0+0x450/0x450 [ 691.532673] mutex_lock_killable_nested+0x16/0x20 [ 691.537509] ? mutex_lock_killable_nested+0x16/0x20 [ 691.542668] do_io_accounting+0x1d1/0xfe0 [ 691.546851] ? get_pid_task+0xd4/0x190 [ 691.550750] ? find_held_lock+0x35/0x120 [ 691.554811] ? get_pid_task+0xd4/0x190 [ 691.558691] ? proc_pid_stack+0x430/0x430 [ 691.562861] ? rcu_read_unlock_special+0x380/0x380 [ 691.567791] ? kasan_unpoison_shadow+0x35/0x50 [ 691.572375] proc_tgid_io_accounting+0x23/0x30 [ 691.576967] proc_single_show+0xf6/0x180 [ 691.581053] seq_read+0x4db/0x1130 [ 691.584595] do_iter_read+0x4a9/0x660 [ 691.588388] ? dup_iter+0x260/0x260 [ 691.592026] vfs_readv+0x175/0x1c0 [ 691.595563] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 691.600926] ? trace_hardirqs_off_caller+0x300/0x300 [ 691.606027] ? mutex_lock_nested+0x16/0x20 [ 691.610250] ? mutex_lock_nested+0x16/0x20 [ 691.614481] ? __fdget_pos+0xdc/0x1f0 [ 691.618272] ? __fdget_raw+0x20/0x20 [ 691.621974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 691.627547] ? put_timespec64+0x115/0x1b0 [ 691.631718] do_readv+0x11a/0x300 [ 691.635163] ? vfs_readv+0x1c0/0x1c0 [ 691.638875] ? trace_hardirqs_off_caller+0x300/0x300 [ 691.643989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 691.648741] __x64_sys_readv+0x75/0xb0 [ 691.652629] do_syscall_64+0x1a3/0x800 [ 691.656514] ? syscall_return_slowpath+0x5f0/0x5f0 [ 691.661442] ? prepare_exit_to_usermode+0x232/0x3b0 [ 691.666454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 691.671311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.676490] RIP: 0033:0x457ec9 [ 691.679717] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.698609] RSP: 002b:00007f8faa6cac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 691.706353] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 691.713612] RDX: 0000000000000001 RSI: 0000000020000580 RDI: 0000000000000003 [ 691.720876] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 18:05:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x3, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 691.728132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8faa6cb6d4 [ 691.735393] R13: 00000000004c487d R14: 00000000004d7ff0 R15: 00000000ffffffff [ 691.756962] kobject: 'event4' (000000000331fd6b): kobject_uevent_env [ 691.769457] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 691.776446] kobject: 'event4' (000000000331fd6b): fill_kobj_path: path = '/devices/virtual/input/input1295/event4' [ 691.799226] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 691.800728] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 691.820477] kobject: '(null)' (00000000accaa46a): kobject_cleanup, parent 000000000331fd6b [ 691.829722] kobject: 'loop5' (0000000014f11e9e): kobject_uevent_env [ 691.840334] kobject: '(null)' (00000000accaa46a): calling ktype release [ 691.847262] kobject: 'loop5' (0000000014f11e9e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 691.849487] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 691.897263] kobject: 'event4' (000000000331fd6b): kobject_cleanup, parent (null) [ 691.906134] kobject: 'loop3' (00000000c2e60c57): kobject_uevent_env [ 691.917645] kobject: 'event4' (000000000331fd6b): calling ktype release [ 691.924554] kobject: 'loop3' (00000000c2e60c57): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 691.937986] kobject: 'event4': free name 18:05:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfsz', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) [ 691.946756] kobject: 'input1295' (000000006b2c3a58): kobject_uevent_env [ 691.963414] gfs2: not a GFS2 filesystem [ 691.980795] kobject: 'input1295' (000000006b2c3a58): fill_kobj_path: path = '/devices/virtual/input/input1295' 18:05:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x4, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 692.019417] kobject: 'input1295' (000000006b2c3a58): kobject_cleanup, parent (null) [ 692.028404] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 692.042731] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.069077] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 692.079753] kobject: 'input1295' (000000006b2c3a58): calling ktype release [ 692.086942] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.100882] kobject: 'input1295': free name [ 692.105422] kobject: 'loop3' (00000000c2e60c57): kobject_uevent_env 18:05:23 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000002dc0)=""/130, 0x1f) r2 = syz_open_dev$admmidi(&(0x7f0000002a80)='/dev/admmidi#\x00', 0x5, 0x20000) write$P9_RFLUSH(r2, &(0x7f0000002d80)={0x7, 0x6d, 0x1}, 0x7) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002900)=0xfffffffffffffd4f) sendmmsg(r3, &(0x7f0000002b80)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x3, 0x1, {0xa, 0x4e24, 0x2, @remote, 0x3}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="50791698c2a12b50f7d4e0980d18d7c5111599d07a8baa2e6458dc1f919bd61ee6799b631f893fcaf53087f0c6a9fe06f9bf50e3267e5b31303847f9a0ce2530d534ffdf2e6a76dbcd738ed641ef83540cb8d8c7724502d1", 0x58}, {&(0x7f0000000100)="88caa18f9f1b97133a5caebd37a8b12a5d174531bc944832f1e7aeef4655df855d8641baea6718fe9251d7d0af3380982c7cbbe28befb148362b6f", 0x3b}], 0x2, &(0x7f0000000180)=[{0x90, 0x11f, 0xb2cd, "504c535939239d2463e937de67f204a6ef7b792e2078f9502919d49f4b24107f4c54dbaf629956d6e022845267a62ffddac920f017545a4e8d16df8a1f30b46d252671bf9fda311b592139215cf5979e2676239860c64f5972398cf8773d97da5072ff1c745990110c103a22ae9cda7d023493ce0effc4b2364eb7"}, {0xb0, 0x11, 0x9, "51af1461edd912e515bd23ce37083643f84343037192ca578abbf44cd324144ec8cae6a55e0dfc0b471514b8275feb035e7edb37704143b772b83c25139f0c39d5f7993324680d7153138335d90b4564782cdcbd234c0a52597cec922260f0de55a4445d77c45e09961837b2ea4f7246ccdd9c911dc186d4aeee92afc4283d0e366362b3e3dc1a05fd35bd07cc132719f3ee80b0b7261aecbb05"}, {0xb8, 0x195, 0x0, "36966a897490b8b55a1d1288734113a67a0f40e28b039e10da11a56b3f7b572947b44893fd70d776a8fe3201b90122113ca621f63931b8db70b057fc6ef93d0b997ad9c04efa300ad9c32dfd3d7e7e7951930b70f6c6c5f632c07369336328c2822fcbb73d0b69c0b8d6bd53b73f1647e1dfdb299a5712227048eb3e1c73c727c448b06bdf7c65c7de62a946895ef4e028ae21d1fe25fd19f84e56c31a70a80f4fd8cdc0"}, {0x60, 0x117, 0x10001, "dfd8113f23c80f033c7f7d3a8ba1758c614890c513548373c8eda02c7d24ef79a26ea47ffea4a40fd71f93e1baea775d5154c859a6499ebe61a114c2b72892d54dfed0bc6126df685fa6"}, {0xb0, 0x116, 0x1, "a283b8f8487ead2242283d6213266bff7f6afd9148824f4927555f1aa0825b7c247d33bf7aedd6027023a8c30494e656a9fa14cd621c3997681516e2959c6f675131d5c0d970d10e44611b18c62d9bfd5dca60b0a34f8190e524a84f6ed591e7de1a51814e8a48bd835876ef55f229fdab44f2d42fdf8dd99b0bde8005514c32b8d971caba24cb15eb05be9e98226afbf1be58f06eba81ac0c90baa5b05665"}, {0x80, 0x3a, 0x1, "4536f28ee78982840fa2c7d34892cf4948c0c4a93a53151c0a8266cb819607d708f67fed49b17696588ffaf9e281c5f9e74191dd16d88d7103fdd9dc14501bd6069af60f8afc5e8e9e503f7dc3276f1268d63b5e6ce0936248e93ee402b469f9c6ecb7d385175546f5"}, {0x70, 0x116, 0x6, "5ff04d6398b1cb5c078fae0a0823f716e80fdfc9bf6ab388dfe6a35707db00a5e1b08f18bcff4a977bc484883625536e463a904ad7db22b7287c9e4d7f79b37af886a13abd54b2b8e77239179095366034e931f9d82ff8b82bf6"}], 0x3f8}, 0x9}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="620074534325d5e9e0afead8b2ff763f83050e2889c8c6291d0820847f985fe71d9a05cb8285eeab38ff265e23c616a71d2bc266bd5114b808a32bc766be452495ec45c879852600d1e590299f9fd3d4ab28", 0x52}], 0x1, &(0x7f0000000640)=[{0xf0, 0x1ff, 0x8, "5e37f1a3406cdfb9da0ff0b3af14fd8a8afb4c30a02fc0c3e65572c4cf75b951410facf83a265972b443d9853d44f2d38511f941208232a38467624434cda71b5949ca3bdf5ead0934dd4ad892bb0717af70011666ce9de9dee28d466133911911fd279e48446cca932938b6fe8de879617076e3232bf5a6f094d0fda0f8ea795edbb071fb4b6fc2a2f0dd0bac0c3a3dbfaf4930f48860b8eb967ad56c8d76fdac2b78a5e4c28f76c48f8d12536aa80cfb8820a5420f8149c401ba479be6a7d436e4e863389738626a3c9c46c5fbe47a64667b25d56f3b1e24cfad"}, {0xd0, 0x11d, 0xa1a, "b06e224030389ca964b4d96df16eaaa5f11f076301b0458576d6b2f4d4bd6bd752c3241f9ab628605ec118eb4994b4a10915e1318768a5d1d41b9805fad8e45a4e51f9c9f409e3f58b0a6fa23279ed13d95260fc55ebdd7ad8275a3a9a0355abf5aa6300ab5343acbda458944bc6bb60b11f2c0a15894c156681a5a384d5f11842bfc1306a517aeac5b757d4a0ce87a49791ef3162a05479988c24bb93a8675615f53fdfc026f1217ed902281c01e02b6e44be059ac63ff83afdac"}, {0x40, 0x110, 0x6, "858c121bfceb9e901ca63f1d2a1069f3a3774ca52e7934d4b70a3c4b9273c1c98c5f6086b0b811ebdd62"}, {0x50, 0x0, 0xfff, "6605727e58b8df8b74d787b4700ad498e2fd5d5609603b0e136f9694745d72924463c445a46e21e47425168b8b780baf94dfd3795456cabe6f5d2aea"}, {0xe0, 0xff, 0xa5, "482640a49744baba89ddbfc3cd6097297fe33e3e916d8e09f55cef00ccd119c0e8847a9f77203de818e1f65906d833aed42386c2389df783189c5e32a33b796b75aeaab70661b9ec4527458bf9f69ac18dfc110240164ab5111f2a0b187a54c4e9896475425ce174fccb30a823f5ec9c23bd1199298a62d17f2be2370666da72e6765c6e759bdca5c7d7e68b3a5d1a078d30450a27ac2a5a6068b631b9545d3dab1389cb631a5b70d0232025688808dc437cec1fa53dd15cd2207ab3dbbb6d6e4abbc00f467c7ccd3c9d"}, {0x88, 0x10f, 0x2, "83b22d16ee962859c2ece31bb3a5b7206b1fb5199f81138e27c600eb0a078c495cfa74eeb1a3e8f6490f159a1bc6a3eac2906641128548b5e50ef7fff772d72285b87f4f9617ff68bb65851c4898a1246e762d16f2bdcfcae16f76760ae0f0e87c4fbca6b4becbd6ca1772b08571f94320"}, {0xd8, 0x84, 0x9, "58dc828056df3120ac328e08dd2d3f64dd51e81387c5050b230cd5bf81c15c85068e2d174985ba6120d7ba9b5605caac79a0e24787bdbced6d361f75d7c02efdc2c78b92138171f8c2b143276c7b6b602c765cc74e60af5ba197f012b73d57ff41f8f4cf9b44ec6bb794f3fdf4deb3ced0df1dd2835cad46975e4f35d54997b4bce6dcb309c05ad68575b7cae9f6eec4af53cc51662df70fc54813da34b975692c0146c40eaac4e26c5b4719b6e84632024b7e7dc856d5bc5bfb9e6ab4d3d4acd2531b9e16391d"}, {0x50, 0x116, 0x8, "c7d68b6b495fd6f6c353e879155cbec5c5c02b5b0738b9e3d4a0a93721930f85dd975b7f06067307c8c756489e9f4f1f6d3d6ff5cf232d3cb5760aed066f"}], 0x4e0}, 0x8}, {{&(0x7f0000000b40)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x6f, @dev={0xfe, 0x80, [], 0x23}, 0x1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000bc0)="287505cd49f55ae5f04fbbd409646a762d3c3a3ccb87d2b2aff66b6cf87562faed0459d851a0c6a657a80f3cc356d15306e17d331087484d2c90be2d9d02a8bb6d03dae41c8537a868de7b180c4ffe8f2ecc520f7736f5b22b3c8fb174304cdfb7e0fd967054a43a20a97b906672c9c669ad594dda0ddf3ddc2b6b39db51cf3adf8ffa6ae8fb138db7cdbfe567af8f1a409ed65e26809a8b37571c987bc52e6cec448edccd12030cb1e911d2d749a2e07965e27c72576ffd7421bcc549591071e89ee7c86201e7f57a6a3e3fe7ae65b9880312e092b4937ec7fc53a2ec7ec8", 0xdf}, {&(0x7f0000000cc0)="fdcc46b3f7c4727dbbd4830680bd439f71f0c03c85898cebd0fc91f004a4a9a8679a0e38b98152c7bb725dc67e54659a6e49edc256583b3680437cd1bc47f9ae931a6dec330440b7d398ac5d52b3e3008b1edd5dc4d27b172ad199485c5f811d2b03ee71a81f07c8e7c4f8497c499db48a98a109f26ec8deb63b460a11c51bc0dfd4806ff8a6f653a90a1cd55dc23b7e2e5d46ccf63b", 0x96}, {&(0x7f0000000d80)="b9e765b3c2ba39489e3945c57330d92049eca921ae58b21256172e9272ddeca3087c1c6b75f6f3a797b8fc060f4301401287407481383daabbd4ddd74c1f8c1eca474075a3263d748d4055c3ca448dd7a50b7b5c5bef65673e9e1e5ce394e41f", 0x60}, {&(0x7f0000000e00)="81b8d427194cfea21eaefd40870ed72a459fa185df5ca23d774aadeb92179248cc41e99fa7aaaaa3102532c30c640c17ce9bff29ae6d0d160081d79b655ac17c34bcc35b6a91762a78cc63283cf01492f3e06ca36f8e92e2c79ac0ac7f75944d595a83af52517650f6f1d3adc7ab5fc6e724d633b01400c910b00fa35a97d19c28a4bea382d48dfbeee3bd83b2c09fb0803f02", 0x93}, {&(0x7f0000000ec0)="5b5221a89d61c0a1807ecf4ac6945680fe0c724ee43a70240fb9b9b9a4386c59268292f204ef07bd4c94648eb132962edc4ed7fa505804af587bab9a4249021ecdadaf324cd2b3b543d31f2c6135d41b107817f7f69b1c843c1107df51808b4e9a1f92a0f6afc6b3f6dab63beaead05039b2ac14b054c986c0a2adc157ab853fcc982e550519d802d3059631e32f62ad6fa6492834bebe6a60352846a7cb1c1a0119a08546ef8855bd1c88", 0xab}], 0x5, &(0x7f0000001000)=[{0xf0, 0x0, 0x7, "4d092735bcbfd53bfc460aa83fc8b6ca286edca70d766a6fb64289a73a177b81027b140b9df9f5a0128dfbda82dca4a9589c636b90cc3dcdbf4cb94a6378ca15b75d50f08e3e2cec7097e45329193dc62e915cf87aed95706a978f57625f70fa6dfed232b24b51b334ddc2deed650e0b096c6c183ad7cf3c5bcbcea29abaebb30007c8dd02433cca3738cebd9fd906944bb96940c75b221d838ec654a585f5dcd08aa0965aaa90931ae706b3422b565504eaf0d3c218991fc5946092c37a17f9b35d17890eedfd41e77ecc248900535c46a32c18a4b5fe423e3c"}, {0xe0, 0x0, 0x8000, "6f8eeb368a46f369b5538806abd6d84f831b585c6fc5e4e5121e9494d11a78781ca226902fcbd8a05e0b27ede08adf0ae4d922399e64b9a67f50c5a253b37c489256c712f3b9d35425aa93134a4856f43da19f4ab59e210c46e808b66f6bff6bb97aaadbd54d3b22fedd24d734910cb4e9a8be639a0fb0b751562edbc0843d641d5d23024c5f29180fdfe68eba582db5629da32985d4b3b29b2cba6ad05390ee6e87e43c24db7fb13d1583859d306c9ca5c511583327b27a238bc634fc3aa9421d58cd78d5b06ff10745965c4f5aea"}, {0x10, 0x13f, 0x3}], 0x1e0}, 0x4}, {{&(0x7f0000001200)=@sco={0x1f, {0x7, 0x4, 0x9, 0x95bb, 0x28000000000000, 0x80}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001280)="fb6e336175e80443a9fb", 0xa}, {&(0x7f00000012c0)="e905d1d8c517b2b52ad00f6af37b0165da95d9d18a6f88556363edf25f42dbdf89f42892e88f8e4c37b56a19eed2ccb9bebf585299a7e9e45f78f40336b9", 0x3e}, {&(0x7f0000001300)="12e314f448738efd", 0x8}, {&(0x7f0000001340)="a063562368fcce3ec6d2f8223a53ab8a19d1e0c72738d82b2efe694ecb8a25a5046e434f796d1c7f9cb86891b3cf8d13658bf499419390e161a3c6f526aa02b030255f579056448456ce3be45d2c3c4631f66f3ef77b53cce0d58dbeabc89135a83c8651cbb8eaba5790f4b596d88dc264082d13cf6202b2952f810d36aea335ee540547baa788a4e7d2d6de814737e0be13e9c10d836682dc0e26c4e9760cbb64ecf4f59f7b7751bd1f0116217c0a3bacd741918bea20da850ec9", 0xbb}, {&(0x7f0000001400)="985e900262e469405ad6c2b5eb74cdc3efd4ff540ec4dff18e8c2ea2f8964360a4d5712b6764e0dd516e3514a8330135f8a855c27b3e1004ebb895e22eb854ee642a8e7daca7975c9beabfca21c3121819b52a65483b3686906310e04b713fdc793cbae4aa8126325fc50cb8de7333a4ac5e446827e9cfc933", 0x79}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="751987c8cf49218d583bc94115eff57195adc0f6fd236c566193cd14e3dcae47f24acfbfeb88df0aa8fe3a1fca2d4daf7a2b2b1ccb19caf5752b79169bbe6121c990b30d257c97c52886b9a2ddc68c039e787660472904f54d497c8515ca041238e0c9dbffdfc9db275fb1a766336352ff8cffb10e02309a25cbe2055ec2c0e24b9bb565e5822b1176fb7bf6116e133667b9b9f765fd55f16736ceb96a4d4d6a9a1430d16e1124beba25b340f46975bbf6bcd32555ee0fdb8aec", 0xba}, {&(0x7f0000002540)="7d6ad8494230d79991d0adcf1e2d82b9323d107df4961b15c43dfb2d8e4a423bca6f2c399ed90ae06d90af2aeff7fb19177dba0041303b3bdc0123557400e5604762a78c8bcefb503f61440ede748bbab441", 0x52}, {&(0x7f00000025c0)="7e83e5b71f29a7f98f7cc5d99f97b98655b5afd01d9ff21895268ce5fed97380359b3bf2dca111e7a2ed6852bd3c2e3338e6888f24d790f788c87e2a9f11a59d6324a481553e22f9795c2be0a2033184a959d9761dadc8ebc9", 0x59}], 0x9, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], 0x1a0}, 0x7}, {{&(0x7f0000002940)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="3d33a147eb7b7459343ddaed0e78bb04fd64fe571f", 0x15}, {&(0x7f0000002a00)="d62f75c28e23f90ad28e4adf8a5ae971bb77ace4dcbec9a303c7efd4891a9a7674697624ba5b3a2e8e3e22e2a48bfae769a0501e74f1a70733ad314629a26ea9b04bea8defb7a70868ff69ebb70b", 0x4e}, {&(0x7f0000002a80)}], 0x3, &(0x7f0000002b00)=[{0x78, 0xee84e6d63f74349d, 0x8aa3, "fe16be985534f2d56eb081d515da81642e1bc3ce411c6b3aef057874f7c64bf2dd320e99bdc8473a53f3be5b78a8431ced4eef327ba8da692c5138dff7650285fafef432c26bdba7eb6d481603fa24e350e3de4d70102c1ca8b4524745c26cca9693"}], 0x78}, 0x100000001}], 0x5, 0x40) 18:05:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000002dc0)=""/130, 0x1f) r2 = syz_open_dev$admmidi(&(0x7f0000002a80)='/dev/admmidi#\x00', 0x5, 0x20000) write$P9_RFLUSH(r2, &(0x7f0000002d80)={0x7, 0x6d, 0x1}, 0x7) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002900)=0xfffffffffffffd4f) sendmmsg(r3, &(0x7f0000002b80)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x3, 0x1, {0xa, 0x4e24, 0x2, @remote, 0x3}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="50791698c2a12b50f7d4e0980d18d7c5111599d07a8baa2e6458dc1f919bd61ee6799b631f893fcaf53087f0c6a9fe06f9bf50e3267e5b31303847f9a0ce2530d534ffdf2e6a76dbcd738ed641ef83540cb8d8c7724502d1", 0x58}, {&(0x7f0000000100)="88caa18f9f1b97133a5caebd37a8b12a5d174531bc944832f1e7aeef4655df855d8641baea6718fe9251d7d0af3380982c7cbbe28befb148362b6f", 0x3b}], 0x2, &(0x7f0000000180)=[{0x90, 0x11f, 0xb2cd, "504c535939239d2463e937de67f204a6ef7b792e2078f9502919d49f4b24107f4c54dbaf629956d6e022845267a62ffddac920f017545a4e8d16df8a1f30b46d252671bf9fda311b592139215cf5979e2676239860c64f5972398cf8773d97da5072ff1c745990110c103a22ae9cda7d023493ce0effc4b2364eb7"}, {0xb0, 0x11, 0x9, "51af1461edd912e515bd23ce37083643f84343037192ca578abbf44cd324144ec8cae6a55e0dfc0b471514b8275feb035e7edb37704143b772b83c25139f0c39d5f7993324680d7153138335d90b4564782cdcbd234c0a52597cec922260f0de55a4445d77c45e09961837b2ea4f7246ccdd9c911dc186d4aeee92afc4283d0e366362b3e3dc1a05fd35bd07cc132719f3ee80b0b7261aecbb05"}, {0xb8, 0x195, 0x0, "36966a897490b8b55a1d1288734113a67a0f40e28b039e10da11a56b3f7b572947b44893fd70d776a8fe3201b90122113ca621f63931b8db70b057fc6ef93d0b997ad9c04efa300ad9c32dfd3d7e7e7951930b70f6c6c5f632c07369336328c2822fcbb73d0b69c0b8d6bd53b73f1647e1dfdb299a5712227048eb3e1c73c727c448b06bdf7c65c7de62a946895ef4e028ae21d1fe25fd19f84e56c31a70a80f4fd8cdc0"}, {0x60, 0x117, 0x10001, "dfd8113f23c80f033c7f7d3a8ba1758c614890c513548373c8eda02c7d24ef79a26ea47ffea4a40fd71f93e1baea775d5154c859a6499ebe61a114c2b72892d54dfed0bc6126df685fa6"}, {0xb0, 0x116, 0x1, "a283b8f8487ead2242283d6213266bff7f6afd9148824f4927555f1aa0825b7c247d33bf7aedd6027023a8c30494e656a9fa14cd621c3997681516e2959c6f675131d5c0d970d10e44611b18c62d9bfd5dca60b0a34f8190e524a84f6ed591e7de1a51814e8a48bd835876ef55f229fdab44f2d42fdf8dd99b0bde8005514c32b8d971caba24cb15eb05be9e98226afbf1be58f06eba81ac0c90baa5b05665"}, {0x80, 0x3a, 0x1, "4536f28ee78982840fa2c7d34892cf4948c0c4a93a53151c0a8266cb819607d708f67fed49b17696588ffaf9e281c5f9e74191dd16d88d7103fdd9dc14501bd6069af60f8afc5e8e9e503f7dc3276f1268d63b5e6ce0936248e93ee402b469f9c6ecb7d385175546f5"}, {0x70, 0x116, 0x6, "5ff04d6398b1cb5c078fae0a0823f716e80fdfc9bf6ab388dfe6a35707db00a5e1b08f18bcff4a977bc484883625536e463a904ad7db22b7287c9e4d7f79b37af886a13abd54b2b8e77239179095366034e931f9d82ff8b82bf6"}], 0x3f8}, 0x9}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="620074534325d5e9e0afead8b2ff763f83050e2889c8c6291d0820847f985fe71d9a05cb8285eeab38ff265e23c616a71d2bc266bd5114b808a32bc766be452495ec45c879852600d1e590299f9fd3d4ab28", 0x52}], 0x1, &(0x7f0000000640)=[{0xf0, 0x1ff, 0x8, "5e37f1a3406cdfb9da0ff0b3af14fd8a8afb4c30a02fc0c3e65572c4cf75b951410facf83a265972b443d9853d44f2d38511f941208232a38467624434cda71b5949ca3bdf5ead0934dd4ad892bb0717af70011666ce9de9dee28d466133911911fd279e48446cca932938b6fe8de879617076e3232bf5a6f094d0fda0f8ea795edbb071fb4b6fc2a2f0dd0bac0c3a3dbfaf4930f48860b8eb967ad56c8d76fdac2b78a5e4c28f76c48f8d12536aa80cfb8820a5420f8149c401ba479be6a7d436e4e863389738626a3c9c46c5fbe47a64667b25d56f3b1e24cfad"}, {0xd0, 0x11d, 0xa1a, "b06e224030389ca964b4d96df16eaaa5f11f076301b0458576d6b2f4d4bd6bd752c3241f9ab628605ec118eb4994b4a10915e1318768a5d1d41b9805fad8e45a4e51f9c9f409e3f58b0a6fa23279ed13d95260fc55ebdd7ad8275a3a9a0355abf5aa6300ab5343acbda458944bc6bb60b11f2c0a15894c156681a5a384d5f11842bfc1306a517aeac5b757d4a0ce87a49791ef3162a05479988c24bb93a8675615f53fdfc026f1217ed902281c01e02b6e44be059ac63ff83afdac"}, {0x40, 0x110, 0x6, "858c121bfceb9e901ca63f1d2a1069f3a3774ca52e7934d4b70a3c4b9273c1c98c5f6086b0b811ebdd62"}, {0x50, 0x0, 0xfff, "6605727e58b8df8b74d787b4700ad498e2fd5d5609603b0e136f9694745d72924463c445a46e21e47425168b8b780baf94dfd3795456cabe6f5d2aea"}, {0xe0, 0xff, 0xa5, "482640a49744baba89ddbfc3cd6097297fe33e3e916d8e09f55cef00ccd119c0e8847a9f77203de818e1f65906d833aed42386c2389df783189c5e32a33b796b75aeaab70661b9ec4527458bf9f69ac18dfc110240164ab5111f2a0b187a54c4e9896475425ce174fccb30a823f5ec9c23bd1199298a62d17f2be2370666da72e6765c6e759bdca5c7d7e68b3a5d1a078d30450a27ac2a5a6068b631b9545d3dab1389cb631a5b70d0232025688808dc437cec1fa53dd15cd2207ab3dbbb6d6e4abbc00f467c7ccd3c9d"}, {0x88, 0x10f, 0x2, "83b22d16ee962859c2ece31bb3a5b7206b1fb5199f81138e27c600eb0a078c495cfa74eeb1a3e8f6490f159a1bc6a3eac2906641128548b5e50ef7fff772d72285b87f4f9617ff68bb65851c4898a1246e762d16f2bdcfcae16f76760ae0f0e87c4fbca6b4becbd6ca1772b08571f94320"}, {0xd8, 0x84, 0x9, "58dc828056df3120ac328e08dd2d3f64dd51e81387c5050b230cd5bf81c15c85068e2d174985ba6120d7ba9b5605caac79a0e24787bdbced6d361f75d7c02efdc2c78b92138171f8c2b143276c7b6b602c765cc74e60af5ba197f012b73d57ff41f8f4cf9b44ec6bb794f3fdf4deb3ced0df1dd2835cad46975e4f35d54997b4bce6dcb309c05ad68575b7cae9f6eec4af53cc51662df70fc54813da34b975692c0146c40eaac4e26c5b4719b6e84632024b7e7dc856d5bc5bfb9e6ab4d3d4acd2531b9e16391d"}, {0x50, 0x116, 0x8, "c7d68b6b495fd6f6c353e879155cbec5c5c02b5b0738b9e3d4a0a93721930f85dd975b7f06067307c8c756489e9f4f1f6d3d6ff5cf232d3cb5760aed066f"}], 0x4e0}, 0x8}, {{&(0x7f0000000b40)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x6f, @dev={0xfe, 0x80, [], 0x23}, 0x1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000bc0)="287505cd49f55ae5f04fbbd409646a762d3c3a3ccb87d2b2aff66b6cf87562faed0459d851a0c6a657a80f3cc356d15306e17d331087484d2c90be2d9d02a8bb6d03dae41c8537a868de7b180c4ffe8f2ecc520f7736f5b22b3c8fb174304cdfb7e0fd967054a43a20a97b906672c9c669ad594dda0ddf3ddc2b6b39db51cf3adf8ffa6ae8fb138db7cdbfe567af8f1a409ed65e26809a8b37571c987bc52e6cec448edccd12030cb1e911d2d749a2e07965e27c72576ffd7421bcc549591071e89ee7c86201e7f57a6a3e3fe7ae65b9880312e092b4937ec7fc53a2ec7ec8", 0xdf}, {&(0x7f0000000cc0)="fdcc46b3f7c4727dbbd4830680bd439f71f0c03c85898cebd0fc91f004a4a9a8679a0e38b98152c7bb725dc67e54659a6e49edc256583b3680437cd1bc47f9ae931a6dec330440b7d398ac5d52b3e3008b1edd5dc4d27b172ad199485c5f811d2b03ee71a81f07c8e7c4f8497c499db48a98a109f26ec8deb63b460a11c51bc0dfd4806ff8a6f653a90a1cd55dc23b7e2e5d46ccf63b", 0x96}, {&(0x7f0000000d80)="b9e765b3c2ba39489e3945c57330d92049eca921ae58b21256172e9272ddeca3087c1c6b75f6f3a797b8fc060f4301401287407481383daabbd4ddd74c1f8c1eca474075a3263d748d4055c3ca448dd7a50b7b5c5bef65673e9e1e5ce394e41f", 0x60}, {&(0x7f0000000e00)="81b8d427194cfea21eaefd40870ed72a459fa185df5ca23d774aadeb92179248cc41e99fa7aaaaa3102532c30c640c17ce9bff29ae6d0d160081d79b655ac17c34bcc35b6a91762a78cc63283cf01492f3e06ca36f8e92e2c79ac0ac7f75944d595a83af52517650f6f1d3adc7ab5fc6e724d633b01400c910b00fa35a97d19c28a4bea382d48dfbeee3bd83b2c09fb0803f02", 0x93}, {&(0x7f0000000ec0)="5b5221a89d61c0a1807ecf4ac6945680fe0c724ee43a70240fb9b9b9a4386c59268292f204ef07bd4c94648eb132962edc4ed7fa505804af587bab9a4249021ecdadaf324cd2b3b543d31f2c6135d41b107817f7f69b1c843c1107df51808b4e9a1f92a0f6afc6b3f6dab63beaead05039b2ac14b054c986c0a2adc157ab853fcc982e550519d802d3059631e32f62ad6fa6492834bebe6a60352846a7cb1c1a0119a08546ef8855bd1c88", 0xab}], 0x5, &(0x7f0000001000)=[{0xf0, 0x0, 0x7, "4d092735bcbfd53bfc460aa83fc8b6ca286edca70d766a6fb64289a73a177b81027b140b9df9f5a0128dfbda82dca4a9589c636b90cc3dcdbf4cb94a6378ca15b75d50f08e3e2cec7097e45329193dc62e915cf87aed95706a978f57625f70fa6dfed232b24b51b334ddc2deed650e0b096c6c183ad7cf3c5bcbcea29abaebb30007c8dd02433cca3738cebd9fd906944bb96940c75b221d838ec654a585f5dcd08aa0965aaa90931ae706b3422b565504eaf0d3c218991fc5946092c37a17f9b35d17890eedfd41e77ecc248900535c46a32c18a4b5fe423e3c"}, {0xe0, 0x0, 0x8000, "6f8eeb368a46f369b5538806abd6d84f831b585c6fc5e4e5121e9494d11a78781ca226902fcbd8a05e0b27ede08adf0ae4d922399e64b9a67f50c5a253b37c489256c712f3b9d35425aa93134a4856f43da19f4ab59e210c46e808b66f6bff6bb97aaadbd54d3b22fedd24d734910cb4e9a8be639a0fb0b751562edbc0843d641d5d23024c5f29180fdfe68eba582db5629da32985d4b3b29b2cba6ad05390ee6e87e43c24db7fb13d1583859d306c9ca5c511583327b27a238bc634fc3aa9421d58cd78d5b06ff10745965c4f5aea"}, {0x10, 0x13f, 0x3}], 0x1e0}, 0x4}, {{&(0x7f0000001200)=@sco={0x1f, {0x7, 0x4, 0x9, 0x95bb, 0x28000000000000, 0x80}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001280)="fb6e336175e80443a9fb", 0xa}, {&(0x7f00000012c0)="e905d1d8c517b2b52ad00f6af37b0165da95d9d18a6f88556363edf25f42dbdf89f42892e88f8e4c37b56a19eed2ccb9bebf585299a7e9e45f78f40336b9", 0x3e}, {&(0x7f0000001300)="12e314f448738efd", 0x8}, {&(0x7f0000001340)="a063562368fcce3ec6d2f8223a53ab8a19d1e0c72738d82b2efe694ecb8a25a5046e434f796d1c7f9cb86891b3cf8d13658bf499419390e161a3c6f526aa02b030255f579056448456ce3be45d2c3c4631f66f3ef77b53cce0d58dbeabc89135a83c8651cbb8eaba5790f4b596d88dc264082d13cf6202b2952f810d36aea335ee540547baa788a4e7d2d6de814737e0be13e9c10d836682dc0e26c4e9760cbb64ecf4f59f7b7751bd1f0116217c0a3bacd741918bea20da850ec9", 0xbb}, {&(0x7f0000001400)="985e900262e469405ad6c2b5eb74cdc3efd4ff540ec4dff18e8c2ea2f8964360a4d5712b6764e0dd516e3514a8330135f8a855c27b3e1004ebb895e22eb854ee642a8e7daca7975c9beabfca21c3121819b52a65483b3686906310e04b713fdc793cbae4aa8126325fc50cb8de7333a4ac5e446827e9cfc933", 0x79}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="751987c8cf49218d583bc94115eff57195adc0f6fd236c566193cd14e3dcae47f24acfbfeb88df0aa8fe3a1fca2d4daf7a2b2b1ccb19caf5752b79169bbe6121c990b30d257c97c52886b9a2ddc68c039e787660472904f54d497c8515ca041238e0c9dbffdfc9db275fb1a766336352ff8cffb10e02309a25cbe2055ec2c0e24b9bb565e5822b1176fb7bf6116e133667b9b9f765fd55f16736ceb96a4d4d6a9a1430d16e1124beba25b340f46975bbf6bcd32555ee0fdb8aec", 0xba}, {&(0x7f0000002540)="7d6ad8494230d79991d0adcf1e2d82b9323d107df4961b15c43dfb2d8e4a423bca6f2c399ed90ae06d90af2aeff7fb19177dba0041303b3bdc0123557400e5604762a78c8bcefb503f61440ede748bbab441", 0x52}, {&(0x7f00000025c0)="7e83e5b71f29a7f98f7cc5d99f97b98655b5afd01d9ff21895268ce5fed97380359b3bf2dca111e7a2ed6852bd3c2e3338e6888f24d790f788c87e2a9f11a59d6324a481553e22f9795c2be0a2033184a959d9761dadc8ebc9", 0x59}], 0x9, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], 0x1a0}, 0x7}, {{&(0x7f0000002940)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="3d33a147eb7b7459343ddaed0e78bb04fd64fe571f", 0x15}, {&(0x7f0000002a00)="d62f75c28e23f90ad28e4adf8a5ae971bb77ace4dcbec9a303c7efd4891a9a7674697624ba5b3a2e8e3e22e2a48bfae769a0501e74f1a70733ad314629a26ea9b04bea8defb7a70868ff69ebb70b", 0x4e}, {&(0x7f0000002a80)}], 0x3, &(0x7f0000002b00)=[{0x78, 0xee84e6d63f74349d, 0x8aa3, "fe16be985534f2d56eb081d515da81642e1bc3ce411c6b3aef057874f7c64bf2dd320e99bdc8473a53f3be5b78a8431ced4eef327ba8da692c5138dff7650285fafef432c26bdba7eb6d481603fa24e350e3de4d70102c1ca8b4524745c26cca9693"}], 0x78}, 0x100000001}], 0x5, 0x40) [ 692.113076] kobject: 'loop3' (00000000c2e60c57): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 692.127055] kobject: 'input1296' (000000002d9c5204): kobject_cleanup, parent (null) [ 692.135985] kobject: 'input1296' (000000002d9c5204): calling ktype release [ 692.143082] kobject: 'input1296': free name [ 692.161094] kobject: 'loop5' (0000000014f11e9e): kobject_uevent_env 18:05:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r1) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0xffffffffffffff01, 0x1, 0xfa8e, 0x7060ff85}) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 692.167799] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 692.188598] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.206255] kobject: 'loop5' (0000000014f11e9e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 692.240146] kobject: 'loop3' (00000000c2e60c57): kobject_uevent_env [ 692.250267] kobject: 'input1297' (00000000e884e6b6): kobject_add_internal: parent: 'input', set: 'devices' [ 692.265327] kobject: 'loop3' (00000000c2e60c57): fill_kobj_path: path = '/devices/virtual/block/loop3' 18:05:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) [ 692.287558] kobject: 'input1297' (00000000e884e6b6): kobject_uevent_env [ 692.300570] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 692.312075] kobject: 'loop3' (00000000c2e60c57): kobject_uevent_env [ 692.326164] kobject: 'input1297' (00000000e884e6b6): fill_kobj_path: path = '/devices/virtual/input/input1297' [ 692.339683] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.350699] kobject: 'loop3' (00000000c2e60c57): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 692.374152] kobject: 'input1297' (00000000e884e6b6): fill_kobj_path: path = '/devices/virtual/input/input1297' 18:05:24 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000002dc0)=""/130, 0x1f) r2 = syz_open_dev$admmidi(&(0x7f0000002a80)='/dev/admmidi#\x00', 0x5, 0x20000) write$P9_RFLUSH(r2, &(0x7f0000002d80)={0x7, 0x6d, 0x1}, 0x7) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002900)=0xfffffffffffffd4f) sendmmsg(r3, &(0x7f0000002b80)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x3, 0x1, {0xa, 0x4e24, 0x2, @remote, 0x3}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="50791698c2a12b50f7d4e0980d18d7c5111599d07a8baa2e6458dc1f919bd61ee6799b631f893fcaf53087f0c6a9fe06f9bf50e3267e5b31303847f9a0ce2530d534ffdf2e6a76dbcd738ed641ef83540cb8d8c7724502d1", 0x58}, {&(0x7f0000000100)="88caa18f9f1b97133a5caebd37a8b12a5d174531bc944832f1e7aeef4655df855d8641baea6718fe9251d7d0af3380982c7cbbe28befb148362b6f", 0x3b}], 0x2, &(0x7f0000000180)=[{0x90, 0x11f, 0xb2cd, "504c535939239d2463e937de67f204a6ef7b792e2078f9502919d49f4b24107f4c54dbaf629956d6e022845267a62ffddac920f017545a4e8d16df8a1f30b46d252671bf9fda311b592139215cf5979e2676239860c64f5972398cf8773d97da5072ff1c745990110c103a22ae9cda7d023493ce0effc4b2364eb7"}, {0xb0, 0x11, 0x9, "51af1461edd912e515bd23ce37083643f84343037192ca578abbf44cd324144ec8cae6a55e0dfc0b471514b8275feb035e7edb37704143b772b83c25139f0c39d5f7993324680d7153138335d90b4564782cdcbd234c0a52597cec922260f0de55a4445d77c45e09961837b2ea4f7246ccdd9c911dc186d4aeee92afc4283d0e366362b3e3dc1a05fd35bd07cc132719f3ee80b0b7261aecbb05"}, {0xb8, 0x195, 0x0, "36966a897490b8b55a1d1288734113a67a0f40e28b039e10da11a56b3f7b572947b44893fd70d776a8fe3201b90122113ca621f63931b8db70b057fc6ef93d0b997ad9c04efa300ad9c32dfd3d7e7e7951930b70f6c6c5f632c07369336328c2822fcbb73d0b69c0b8d6bd53b73f1647e1dfdb299a5712227048eb3e1c73c727c448b06bdf7c65c7de62a946895ef4e028ae21d1fe25fd19f84e56c31a70a80f4fd8cdc0"}, {0x60, 0x117, 0x10001, "dfd8113f23c80f033c7f7d3a8ba1758c614890c513548373c8eda02c7d24ef79a26ea47ffea4a40fd71f93e1baea775d5154c859a6499ebe61a114c2b72892d54dfed0bc6126df685fa6"}, {0xb0, 0x116, 0x1, "a283b8f8487ead2242283d6213266bff7f6afd9148824f4927555f1aa0825b7c247d33bf7aedd6027023a8c30494e656a9fa14cd621c3997681516e2959c6f675131d5c0d970d10e44611b18c62d9bfd5dca60b0a34f8190e524a84f6ed591e7de1a51814e8a48bd835876ef55f229fdab44f2d42fdf8dd99b0bde8005514c32b8d971caba24cb15eb05be9e98226afbf1be58f06eba81ac0c90baa5b05665"}, {0x80, 0x3a, 0x1, "4536f28ee78982840fa2c7d34892cf4948c0c4a93a53151c0a8266cb819607d708f67fed49b17696588ffaf9e281c5f9e74191dd16d88d7103fdd9dc14501bd6069af60f8afc5e8e9e503f7dc3276f1268d63b5e6ce0936248e93ee402b469f9c6ecb7d385175546f5"}, {0x70, 0x116, 0x6, "5ff04d6398b1cb5c078fae0a0823f716e80fdfc9bf6ab388dfe6a35707db00a5e1b08f18bcff4a977bc484883625536e463a904ad7db22b7287c9e4d7f79b37af886a13abd54b2b8e77239179095366034e931f9d82ff8b82bf6"}], 0x3f8}, 0x9}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="620074534325d5e9e0afead8b2ff763f83050e2889c8c6291d0820847f985fe71d9a05cb8285eeab38ff265e23c616a71d2bc266bd5114b808a32bc766be452495ec45c879852600d1e590299f9fd3d4ab28", 0x52}], 0x1, &(0x7f0000000640)=[{0xf0, 0x1ff, 0x8, "5e37f1a3406cdfb9da0ff0b3af14fd8a8afb4c30a02fc0c3e65572c4cf75b951410facf83a265972b443d9853d44f2d38511f941208232a38467624434cda71b5949ca3bdf5ead0934dd4ad892bb0717af70011666ce9de9dee28d466133911911fd279e48446cca932938b6fe8de879617076e3232bf5a6f094d0fda0f8ea795edbb071fb4b6fc2a2f0dd0bac0c3a3dbfaf4930f48860b8eb967ad56c8d76fdac2b78a5e4c28f76c48f8d12536aa80cfb8820a5420f8149c401ba479be6a7d436e4e863389738626a3c9c46c5fbe47a64667b25d56f3b1e24cfad"}, {0xd0, 0x11d, 0xa1a, "b06e224030389ca964b4d96df16eaaa5f11f076301b0458576d6b2f4d4bd6bd752c3241f9ab628605ec118eb4994b4a10915e1318768a5d1d41b9805fad8e45a4e51f9c9f409e3f58b0a6fa23279ed13d95260fc55ebdd7ad8275a3a9a0355abf5aa6300ab5343acbda458944bc6bb60b11f2c0a15894c156681a5a384d5f11842bfc1306a517aeac5b757d4a0ce87a49791ef3162a05479988c24bb93a8675615f53fdfc026f1217ed902281c01e02b6e44be059ac63ff83afdac"}, {0x40, 0x110, 0x6, "858c121bfceb9e901ca63f1d2a1069f3a3774ca52e7934d4b70a3c4b9273c1c98c5f6086b0b811ebdd62"}, {0x50, 0x0, 0xfff, "6605727e58b8df8b74d787b4700ad498e2fd5d5609603b0e136f9694745d72924463c445a46e21e47425168b8b780baf94dfd3795456cabe6f5d2aea"}, {0xe0, 0xff, 0xa5, "482640a49744baba89ddbfc3cd6097297fe33e3e916d8e09f55cef00ccd119c0e8847a9f77203de818e1f65906d833aed42386c2389df783189c5e32a33b796b75aeaab70661b9ec4527458bf9f69ac18dfc110240164ab5111f2a0b187a54c4e9896475425ce174fccb30a823f5ec9c23bd1199298a62d17f2be2370666da72e6765c6e759bdca5c7d7e68b3a5d1a078d30450a27ac2a5a6068b631b9545d3dab1389cb631a5b70d0232025688808dc437cec1fa53dd15cd2207ab3dbbb6d6e4abbc00f467c7ccd3c9d"}, {0x88, 0x10f, 0x2, "83b22d16ee962859c2ece31bb3a5b7206b1fb5199f81138e27c600eb0a078c495cfa74eeb1a3e8f6490f159a1bc6a3eac2906641128548b5e50ef7fff772d72285b87f4f9617ff68bb65851c4898a1246e762d16f2bdcfcae16f76760ae0f0e87c4fbca6b4becbd6ca1772b08571f94320"}, {0xd8, 0x84, 0x9, "58dc828056df3120ac328e08dd2d3f64dd51e81387c5050b230cd5bf81c15c85068e2d174985ba6120d7ba9b5605caac79a0e24787bdbced6d361f75d7c02efdc2c78b92138171f8c2b143276c7b6b602c765cc74e60af5ba197f012b73d57ff41f8f4cf9b44ec6bb794f3fdf4deb3ced0df1dd2835cad46975e4f35d54997b4bce6dcb309c05ad68575b7cae9f6eec4af53cc51662df70fc54813da34b975692c0146c40eaac4e26c5b4719b6e84632024b7e7dc856d5bc5bfb9e6ab4d3d4acd2531b9e16391d"}, {0x50, 0x116, 0x8, "c7d68b6b495fd6f6c353e879155cbec5c5c02b5b0738b9e3d4a0a93721930f85dd975b7f06067307c8c756489e9f4f1f6d3d6ff5cf232d3cb5760aed066f"}], 0x4e0}, 0x8}, {{&(0x7f0000000b40)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x6f, @dev={0xfe, 0x80, [], 0x23}, 0x1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000bc0)="287505cd49f55ae5f04fbbd409646a762d3c3a3ccb87d2b2aff66b6cf87562faed0459d851a0c6a657a80f3cc356d15306e17d331087484d2c90be2d9d02a8bb6d03dae41c8537a868de7b180c4ffe8f2ecc520f7736f5b22b3c8fb174304cdfb7e0fd967054a43a20a97b906672c9c669ad594dda0ddf3ddc2b6b39db51cf3adf8ffa6ae8fb138db7cdbfe567af8f1a409ed65e26809a8b37571c987bc52e6cec448edccd12030cb1e911d2d749a2e07965e27c72576ffd7421bcc549591071e89ee7c86201e7f57a6a3e3fe7ae65b9880312e092b4937ec7fc53a2ec7ec8", 0xdf}, {&(0x7f0000000cc0)="fdcc46b3f7c4727dbbd4830680bd439f71f0c03c85898cebd0fc91f004a4a9a8679a0e38b98152c7bb725dc67e54659a6e49edc256583b3680437cd1bc47f9ae931a6dec330440b7d398ac5d52b3e3008b1edd5dc4d27b172ad199485c5f811d2b03ee71a81f07c8e7c4f8497c499db48a98a109f26ec8deb63b460a11c51bc0dfd4806ff8a6f653a90a1cd55dc23b7e2e5d46ccf63b", 0x96}, {&(0x7f0000000d80)="b9e765b3c2ba39489e3945c57330d92049eca921ae58b21256172e9272ddeca3087c1c6b75f6f3a797b8fc060f4301401287407481383daabbd4ddd74c1f8c1eca474075a3263d748d4055c3ca448dd7a50b7b5c5bef65673e9e1e5ce394e41f", 0x60}, {&(0x7f0000000e00)="81b8d427194cfea21eaefd40870ed72a459fa185df5ca23d774aadeb92179248cc41e99fa7aaaaa3102532c30c640c17ce9bff29ae6d0d160081d79b655ac17c34bcc35b6a91762a78cc63283cf01492f3e06ca36f8e92e2c79ac0ac7f75944d595a83af52517650f6f1d3adc7ab5fc6e724d633b01400c910b00fa35a97d19c28a4bea382d48dfbeee3bd83b2c09fb0803f02", 0x93}, {&(0x7f0000000ec0)="5b5221a89d61c0a1807ecf4ac6945680fe0c724ee43a70240fb9b9b9a4386c59268292f204ef07bd4c94648eb132962edc4ed7fa505804af587bab9a4249021ecdadaf324cd2b3b543d31f2c6135d41b107817f7f69b1c843c1107df51808b4e9a1f92a0f6afc6b3f6dab63beaead05039b2ac14b054c986c0a2adc157ab853fcc982e550519d802d3059631e32f62ad6fa6492834bebe6a60352846a7cb1c1a0119a08546ef8855bd1c88", 0xab}], 0x5, &(0x7f0000001000)=[{0xf0, 0x0, 0x7, "4d092735bcbfd53bfc460aa83fc8b6ca286edca70d766a6fb64289a73a177b81027b140b9df9f5a0128dfbda82dca4a9589c636b90cc3dcdbf4cb94a6378ca15b75d50f08e3e2cec7097e45329193dc62e915cf87aed95706a978f57625f70fa6dfed232b24b51b334ddc2deed650e0b096c6c183ad7cf3c5bcbcea29abaebb30007c8dd02433cca3738cebd9fd906944bb96940c75b221d838ec654a585f5dcd08aa0965aaa90931ae706b3422b565504eaf0d3c218991fc5946092c37a17f9b35d17890eedfd41e77ecc248900535c46a32c18a4b5fe423e3c"}, {0xe0, 0x0, 0x8000, "6f8eeb368a46f369b5538806abd6d84f831b585c6fc5e4e5121e9494d11a78781ca226902fcbd8a05e0b27ede08adf0ae4d922399e64b9a67f50c5a253b37c489256c712f3b9d35425aa93134a4856f43da19f4ab59e210c46e808b66f6bff6bb97aaadbd54d3b22fedd24d734910cb4e9a8be639a0fb0b751562edbc0843d641d5d23024c5f29180fdfe68eba582db5629da32985d4b3b29b2cba6ad05390ee6e87e43c24db7fb13d1583859d306c9ca5c511583327b27a238bc634fc3aa9421d58cd78d5b06ff10745965c4f5aea"}, {0x10, 0x13f, 0x3}], 0x1e0}, 0x4}, {{&(0x7f0000001200)=@sco={0x1f, {0x7, 0x4, 0x9, 0x95bb, 0x28000000000000, 0x80}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001280)="fb6e336175e80443a9fb", 0xa}, {&(0x7f00000012c0)="e905d1d8c517b2b52ad00f6af37b0165da95d9d18a6f88556363edf25f42dbdf89f42892e88f8e4c37b56a19eed2ccb9bebf585299a7e9e45f78f40336b9", 0x3e}, {&(0x7f0000001300)="12e314f448738efd", 0x8}, {&(0x7f0000001340)="a063562368fcce3ec6d2f8223a53ab8a19d1e0c72738d82b2efe694ecb8a25a5046e434f796d1c7f9cb86891b3cf8d13658bf499419390e161a3c6f526aa02b030255f579056448456ce3be45d2c3c4631f66f3ef77b53cce0d58dbeabc89135a83c8651cbb8eaba5790f4b596d88dc264082d13cf6202b2952f810d36aea335ee540547baa788a4e7d2d6de814737e0be13e9c10d836682dc0e26c4e9760cbb64ecf4f59f7b7751bd1f0116217c0a3bacd741918bea20da850ec9", 0xbb}, {&(0x7f0000001400)="985e900262e469405ad6c2b5eb74cdc3efd4ff540ec4dff18e8c2ea2f8964360a4d5712b6764e0dd516e3514a8330135f8a855c27b3e1004ebb895e22eb854ee642a8e7daca7975c9beabfca21c3121819b52a65483b3686906310e04b713fdc793cbae4aa8126325fc50cb8de7333a4ac5e446827e9cfc933", 0x79}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="751987c8cf49218d583bc94115eff57195adc0f6fd236c566193cd14e3dcae47f24acfbfeb88df0aa8fe3a1fca2d4daf7a2b2b1ccb19caf5752b79169bbe6121c990b30d257c97c52886b9a2ddc68c039e787660472904f54d497c8515ca041238e0c9dbffdfc9db275fb1a766336352ff8cffb10e02309a25cbe2055ec2c0e24b9bb565e5822b1176fb7bf6116e133667b9b9f765fd55f16736ceb96a4d4d6a9a1430d16e1124beba25b340f46975bbf6bcd32555ee0fdb8aec", 0xba}, {&(0x7f0000002540)="7d6ad8494230d79991d0adcf1e2d82b9323d107df4961b15c43dfb2d8e4a423bca6f2c399ed90ae06d90af2aeff7fb19177dba0041303b3bdc0123557400e5604762a78c8bcefb503f61440ede748bbab441", 0x52}, {&(0x7f00000025c0)="7e83e5b71f29a7f98f7cc5d99f97b98655b5afd01d9ff21895268ce5fed97380359b3bf2dca111e7a2ed6852bd3c2e3338e6888f24d790f788c87e2a9f11a59d6324a481553e22f9795c2be0a2033184a959d9761dadc8ebc9", 0x59}], 0x9, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], 0x1a0}, 0x7}, {{&(0x7f0000002940)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="3d33a147eb7b7459343ddaed0e78bb04fd64fe571f", 0x15}, {&(0x7f0000002a00)="d62f75c28e23f90ad28e4adf8a5ae971bb77ace4dcbec9a303c7efd4891a9a7674697624ba5b3a2e8e3e22e2a48bfae769a0501e74f1a70733ad314629a26ea9b04bea8defb7a70868ff69ebb70b", 0x4e}, {&(0x7f0000002a80)}], 0x3, &(0x7f0000002b00)=[{0x78, 0xee84e6d63f74349d, 0x8aa3, "fe16be985534f2d56eb081d515da81642e1bc3ce411c6b3aef057874f7c64bf2dd320e99bdc8473a53f3be5b78a8431ced4eef327ba8da692c5138dff7650285fafef432c26bdba7eb6d481603fa24e350e3de4d70102c1ca8b4524745c26cca9693"}], 0x78}, 0x100000001}], 0x5, 0x40) 18:05:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x5, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 692.388893] kobject: 'loop4' (00000000636e3de8): kobject_uevent_env [ 692.399993] kobject: 'loop4' (00000000636e3de8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 692.414871] input: syz1 as /devices/virtual/input/input1297 [ 692.422199] kobject: 'loop2' (0000000069b92919): kobject_uevent_env [ 692.438882] kobject: 'event4' (00000000988cea78): kobject_add_internal: parent: 'input1297', set: 'devices' [ 692.453089] kobject: 'loop2' (0000000069b92919): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 692.467788] kobject: 'event4' (00000000988cea78): kobject_uevent_env [ 692.474582] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env 18:05:24 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000002dc0)=""/130, 0x1f) r2 = syz_open_dev$admmidi(&(0x7f0000002a80)='/dev/admmidi#\x00', 0x5, 0x20000) write$P9_RFLUSH(r2, &(0x7f0000002d80)={0x7, 0x6d, 0x1}, 0x7) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002900)=0xfffffffffffffd4f) sendmmsg(r3, &(0x7f0000002b80)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x3, 0x1, {0xa, 0x4e24, 0x2, @remote, 0x3}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="50791698c2a12b50f7d4e0980d18d7c5111599d07a8baa2e6458dc1f919bd61ee6799b631f893fcaf53087f0c6a9fe06f9bf50e3267e5b31303847f9a0ce2530d534ffdf2e6a76dbcd738ed641ef83540cb8d8c7724502d1", 0x58}, {&(0x7f0000000100)="88caa18f9f1b97133a5caebd37a8b12a5d174531bc944832f1e7aeef4655df855d8641baea6718fe9251d7d0af3380982c7cbbe28befb148362b6f", 0x3b}], 0x2, &(0x7f0000000180)=[{0x90, 0x11f, 0xb2cd, "504c535939239d2463e937de67f204a6ef7b792e2078f9502919d49f4b24107f4c54dbaf629956d6e022845267a62ffddac920f017545a4e8d16df8a1f30b46d252671bf9fda311b592139215cf5979e2676239860c64f5972398cf8773d97da5072ff1c745990110c103a22ae9cda7d023493ce0effc4b2364eb7"}, {0xb0, 0x11, 0x9, "51af1461edd912e515bd23ce37083643f84343037192ca578abbf44cd324144ec8cae6a55e0dfc0b471514b8275feb035e7edb37704143b772b83c25139f0c39d5f7993324680d7153138335d90b4564782cdcbd234c0a52597cec922260f0de55a4445d77c45e09961837b2ea4f7246ccdd9c911dc186d4aeee92afc4283d0e366362b3e3dc1a05fd35bd07cc132719f3ee80b0b7261aecbb05"}, {0xb8, 0x195, 0x0, "36966a897490b8b55a1d1288734113a67a0f40e28b039e10da11a56b3f7b572947b44893fd70d776a8fe3201b90122113ca621f63931b8db70b057fc6ef93d0b997ad9c04efa300ad9c32dfd3d7e7e7951930b70f6c6c5f632c07369336328c2822fcbb73d0b69c0b8d6bd53b73f1647e1dfdb299a5712227048eb3e1c73c727c448b06bdf7c65c7de62a946895ef4e028ae21d1fe25fd19f84e56c31a70a80f4fd8cdc0"}, {0x60, 0x117, 0x10001, "dfd8113f23c80f033c7f7d3a8ba1758c614890c513548373c8eda02c7d24ef79a26ea47ffea4a40fd71f93e1baea775d5154c859a6499ebe61a114c2b72892d54dfed0bc6126df685fa6"}, {0xb0, 0x116, 0x1, "a283b8f8487ead2242283d6213266bff7f6afd9148824f4927555f1aa0825b7c247d33bf7aedd6027023a8c30494e656a9fa14cd621c3997681516e2959c6f675131d5c0d970d10e44611b18c62d9bfd5dca60b0a34f8190e524a84f6ed591e7de1a51814e8a48bd835876ef55f229fdab44f2d42fdf8dd99b0bde8005514c32b8d971caba24cb15eb05be9e98226afbf1be58f06eba81ac0c90baa5b05665"}, {0x80, 0x3a, 0x1, "4536f28ee78982840fa2c7d34892cf4948c0c4a93a53151c0a8266cb819607d708f67fed49b17696588ffaf9e281c5f9e74191dd16d88d7103fdd9dc14501bd6069af60f8afc5e8e9e503f7dc3276f1268d63b5e6ce0936248e93ee402b469f9c6ecb7d385175546f5"}, {0x70, 0x116, 0x6, "5ff04d6398b1cb5c078fae0a0823f716e80fdfc9bf6ab388dfe6a35707db00a5e1b08f18bcff4a977bc484883625536e463a904ad7db22b7287c9e4d7f79b37af886a13abd54b2b8e77239179095366034e931f9d82ff8b82bf6"}], 0x3f8}, 0x9}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="620074534325d5e9e0afead8b2ff763f83050e2889c8c6291d0820847f985fe71d9a05cb8285eeab38ff265e23c616a71d2bc266bd5114b808a32bc766be452495ec45c879852600d1e590299f9fd3d4ab28", 0x52}], 0x1, &(0x7f0000000640)=[{0xf0, 0x1ff, 0x8, "5e37f1a3406cdfb9da0ff0b3af14fd8a8afb4c30a02fc0c3e65572c4cf75b951410facf83a265972b443d9853d44f2d38511f941208232a38467624434cda71b5949ca3bdf5ead0934dd4ad892bb0717af70011666ce9de9dee28d466133911911fd279e48446cca932938b6fe8de879617076e3232bf5a6f094d0fda0f8ea795edbb071fb4b6fc2a2f0dd0bac0c3a3dbfaf4930f48860b8eb967ad56c8d76fdac2b78a5e4c28f76c48f8d12536aa80cfb8820a5420f8149c401ba479be6a7d436e4e863389738626a3c9c46c5fbe47a64667b25d56f3b1e24cfad"}, {0xd0, 0x11d, 0xa1a, "b06e224030389ca964b4d96df16eaaa5f11f076301b0458576d6b2f4d4bd6bd752c3241f9ab628605ec118eb4994b4a10915e1318768a5d1d41b9805fad8e45a4e51f9c9f409e3f58b0a6fa23279ed13d95260fc55ebdd7ad8275a3a9a0355abf5aa6300ab5343acbda458944bc6bb60b11f2c0a15894c156681a5a384d5f11842bfc1306a517aeac5b757d4a0ce87a49791ef3162a05479988c24bb93a8675615f53fdfc026f1217ed902281c01e02b6e44be059ac63ff83afdac"}, {0x40, 0x110, 0x6, "858c121bfceb9e901ca63f1d2a1069f3a3774ca52e7934d4b70a3c4b9273c1c98c5f6086b0b811ebdd62"}, {0x50, 0x0, 0xfff, "6605727e58b8df8b74d787b4700ad498e2fd5d5609603b0e136f9694745d72924463c445a46e21e47425168b8b780baf94dfd3795456cabe6f5d2aea"}, {0xe0, 0xff, 0xa5, "482640a49744baba89ddbfc3cd6097297fe33e3e916d8e09f55cef00ccd119c0e8847a9f77203de818e1f65906d833aed42386c2389df783189c5e32a33b796b75aeaab70661b9ec4527458bf9f69ac18dfc110240164ab5111f2a0b187a54c4e9896475425ce174fccb30a823f5ec9c23bd1199298a62d17f2be2370666da72e6765c6e759bdca5c7d7e68b3a5d1a078d30450a27ac2a5a6068b631b9545d3dab1389cb631a5b70d0232025688808dc437cec1fa53dd15cd2207ab3dbbb6d6e4abbc00f467c7ccd3c9d"}, {0x88, 0x10f, 0x2, "83b22d16ee962859c2ece31bb3a5b7206b1fb5199f81138e27c600eb0a078c495cfa74eeb1a3e8f6490f159a1bc6a3eac2906641128548b5e50ef7fff772d72285b87f4f9617ff68bb65851c4898a1246e762d16f2bdcfcae16f76760ae0f0e87c4fbca6b4becbd6ca1772b08571f94320"}, {0xd8, 0x84, 0x9, "58dc828056df3120ac328e08dd2d3f64dd51e81387c5050b230cd5bf81c15c85068e2d174985ba6120d7ba9b5605caac79a0e24787bdbced6d361f75d7c02efdc2c78b92138171f8c2b143276c7b6b602c765cc74e60af5ba197f012b73d57ff41f8f4cf9b44ec6bb794f3fdf4deb3ced0df1dd2835cad46975e4f35d54997b4bce6dcb309c05ad68575b7cae9f6eec4af53cc51662df70fc54813da34b975692c0146c40eaac4e26c5b4719b6e84632024b7e7dc856d5bc5bfb9e6ab4d3d4acd2531b9e16391d"}, {0x50, 0x116, 0x8, "c7d68b6b495fd6f6c353e879155cbec5c5c02b5b0738b9e3d4a0a93721930f85dd975b7f06067307c8c756489e9f4f1f6d3d6ff5cf232d3cb5760aed066f"}], 0x4e0}, 0x8}, {{&(0x7f0000000b40)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x6f, @dev={0xfe, 0x80, [], 0x23}, 0x1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000bc0)="287505cd49f55ae5f04fbbd409646a762d3c3a3ccb87d2b2aff66b6cf87562faed0459d851a0c6a657a80f3cc356d15306e17d331087484d2c90be2d9d02a8bb6d03dae41c8537a868de7b180c4ffe8f2ecc520f7736f5b22b3c8fb174304cdfb7e0fd967054a43a20a97b906672c9c669ad594dda0ddf3ddc2b6b39db51cf3adf8ffa6ae8fb138db7cdbfe567af8f1a409ed65e26809a8b37571c987bc52e6cec448edccd12030cb1e911d2d749a2e07965e27c72576ffd7421bcc549591071e89ee7c86201e7f57a6a3e3fe7ae65b9880312e092b4937ec7fc53a2ec7ec8", 0xdf}, {&(0x7f0000000cc0)="fdcc46b3f7c4727dbbd4830680bd439f71f0c03c85898cebd0fc91f004a4a9a8679a0e38b98152c7bb725dc67e54659a6e49edc256583b3680437cd1bc47f9ae931a6dec330440b7d398ac5d52b3e3008b1edd5dc4d27b172ad199485c5f811d2b03ee71a81f07c8e7c4f8497c499db48a98a109f26ec8deb63b460a11c51bc0dfd4806ff8a6f653a90a1cd55dc23b7e2e5d46ccf63b", 0x96}, {&(0x7f0000000d80)="b9e765b3c2ba39489e3945c57330d92049eca921ae58b21256172e9272ddeca3087c1c6b75f6f3a797b8fc060f4301401287407481383daabbd4ddd74c1f8c1eca474075a3263d748d4055c3ca448dd7a50b7b5c5bef65673e9e1e5ce394e41f", 0x60}, {&(0x7f0000000e00)="81b8d427194cfea21eaefd40870ed72a459fa185df5ca23d774aadeb92179248cc41e99fa7aaaaa3102532c30c640c17ce9bff29ae6d0d160081d79b655ac17c34bcc35b6a91762a78cc63283cf01492f3e06ca36f8e92e2c79ac0ac7f75944d595a83af52517650f6f1d3adc7ab5fc6e724d633b01400c910b00fa35a97d19c28a4bea382d48dfbeee3bd83b2c09fb0803f02", 0x93}, {&(0x7f0000000ec0)="5b5221a89d61c0a1807ecf4ac6945680fe0c724ee43a70240fb9b9b9a4386c59268292f204ef07bd4c94648eb132962edc4ed7fa505804af587bab9a4249021ecdadaf324cd2b3b543d31f2c6135d41b107817f7f69b1c843c1107df51808b4e9a1f92a0f6afc6b3f6dab63beaead05039b2ac14b054c986c0a2adc157ab853fcc982e550519d802d3059631e32f62ad6fa6492834bebe6a60352846a7cb1c1a0119a08546ef8855bd1c88", 0xab}], 0x5, &(0x7f0000001000)=[{0xf0, 0x0, 0x7, "4d092735bcbfd53bfc460aa83fc8b6ca286edca70d766a6fb64289a73a177b81027b140b9df9f5a0128dfbda82dca4a9589c636b90cc3dcdbf4cb94a6378ca15b75d50f08e3e2cec7097e45329193dc62e915cf87aed95706a978f57625f70fa6dfed232b24b51b334ddc2deed650e0b096c6c183ad7cf3c5bcbcea29abaebb30007c8dd02433cca3738cebd9fd906944bb96940c75b221d838ec654a585f5dcd08aa0965aaa90931ae706b3422b565504eaf0d3c218991fc5946092c37a17f9b35d17890eedfd41e77ecc248900535c46a32c18a4b5fe423e3c"}, {0xe0, 0x0, 0x8000, "6f8eeb368a46f369b5538806abd6d84f831b585c6fc5e4e5121e9494d11a78781ca226902fcbd8a05e0b27ede08adf0ae4d922399e64b9a67f50c5a253b37c489256c712f3b9d35425aa93134a4856f43da19f4ab59e210c46e808b66f6bff6bb97aaadbd54d3b22fedd24d734910cb4e9a8be639a0fb0b751562edbc0843d641d5d23024c5f29180fdfe68eba582db5629da32985d4b3b29b2cba6ad05390ee6e87e43c24db7fb13d1583859d306c9ca5c511583327b27a238bc634fc3aa9421d58cd78d5b06ff10745965c4f5aea"}, {0x10, 0x13f, 0x3}], 0x1e0}, 0x4}, {{&(0x7f0000001200)=@sco={0x1f, {0x7, 0x4, 0x9, 0x95bb, 0x28000000000000, 0x80}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001280)="fb6e336175e80443a9fb", 0xa}, {&(0x7f00000012c0)="e905d1d8c517b2b52ad00f6af37b0165da95d9d18a6f88556363edf25f42dbdf89f42892e88f8e4c37b56a19eed2ccb9bebf585299a7e9e45f78f40336b9", 0x3e}, {&(0x7f0000001300)="12e314f448738efd", 0x8}, {&(0x7f0000001340)="a063562368fcce3ec6d2f8223a53ab8a19d1e0c72738d82b2efe694ecb8a25a5046e434f796d1c7f9cb86891b3cf8d13658bf499419390e161a3c6f526aa02b030255f579056448456ce3be45d2c3c4631f66f3ef77b53cce0d58dbeabc89135a83c8651cbb8eaba5790f4b596d88dc264082d13cf6202b2952f810d36aea335ee540547baa788a4e7d2d6de814737e0be13e9c10d836682dc0e26c4e9760cbb64ecf4f59f7b7751bd1f0116217c0a3bacd741918bea20da850ec9", 0xbb}, {&(0x7f0000001400)="985e900262e469405ad6c2b5eb74cdc3efd4ff540ec4dff18e8c2ea2f8964360a4d5712b6764e0dd516e3514a8330135f8a855c27b3e1004ebb895e22eb854ee642a8e7daca7975c9beabfca21c3121819b52a65483b3686906310e04b713fdc793cbae4aa8126325fc50cb8de7333a4ac5e446827e9cfc933", 0x79}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="751987c8cf49218d583bc94115eff57195adc0f6fd236c566193cd14e3dcae47f24acfbfeb88df0aa8fe3a1fca2d4daf7a2b2b1ccb19caf5752b79169bbe6121c990b30d257c97c52886b9a2ddc68c039e787660472904f54d497c8515ca041238e0c9dbffdfc9db275fb1a766336352ff8cffb10e02309a25cbe2055ec2c0e24b9bb565e5822b1176fb7bf6116e133667b9b9f765fd55f16736ceb96a4d4d6a9a1430d16e1124beba25b340f46975bbf6bcd32555ee0fdb8aec", 0xba}, {&(0x7f0000002540)="7d6ad8494230d79991d0adcf1e2d82b9323d107df4961b15c43dfb2d8e4a423bca6f2c399ed90ae06d90af2aeff7fb19177dba0041303b3bdc0123557400e5604762a78c8bcefb503f61440ede748bbab441", 0x52}, {&(0x7f00000025c0)="7e83e5b71f29a7f98f7cc5d99f97b98655b5afd01d9ff21895268ce5fed97380359b3bf2dca111e7a2ed6852bd3c2e3338e6888f24d790f788c87e2a9f11a59d6324a481553e22f9795c2be0a2033184a959d9761dadc8ebc9", 0x59}], 0x9, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], 0x1a0}, 0x7}, {{&(0x7f0000002940)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="3d33a147eb7b7459343ddaed0e78bb04fd64fe571f", 0x15}, {&(0x7f0000002a00)="d62f75c28e23f90ad28e4adf8a5ae971bb77ace4dcbec9a303c7efd4891a9a7674697624ba5b3a2e8e3e22e2a48bfae769a0501e74f1a70733ad314629a26ea9b04bea8defb7a70868ff69ebb70b", 0x4e}, {&(0x7f0000002a80)}], 0x3, &(0x7f0000002b00)=[{0x78, 0xee84e6d63f74349d, 0x8aa3, "fe16be985534f2d56eb081d515da81642e1bc3ce411c6b3aef057874f7c64bf2dd320e99bdc8473a53f3be5b78a8431ced4eef327ba8da692c5138dff7650285fafef432c26bdba7eb6d481603fa24e350e3de4d70102c1ca8b4524745c26cca9693"}], 0x78}, 0x100000001}], 0x5, 0x40) [ 692.483416] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.486970] kobject: 'event4' (00000000988cea78): fill_kobj_path: path = '/devices/virtual/input/input1297/event4' [ 692.530007] kobject: 'loop2' (0000000069b92919): kobject_uevent_env 18:05:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x6, 0x0, 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@tails_on='tails=on'}]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 18:05:24 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000002dc0)=""/130, 0x1f) r2 = syz_open_dev$admmidi(&(0x7f0000002a80)='/dev/admmidi#\x00', 0x5, 0x20000) write$P9_RFLUSH(r2, &(0x7f0000002d80)={0x7, 0x6d, 0x1}, 0x7) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002900)=0xfffffffffffffd4f) sendmmsg(r3, &(0x7f0000002b80)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x3, 0x1, {0xa, 0x4e24, 0x2, @remote, 0x3}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="50791698c2a12b50f7d4e0980d18d7c5111599d07a8baa2e6458dc1f919bd61ee6799b631f893fcaf53087f0c6a9fe06f9bf50e3267e5b31303847f9a0ce2530d534ffdf2e6a76dbcd738ed641ef83540cb8d8c7724502d1", 0x58}, {&(0x7f0000000100)="88caa18f9f1b97133a5caebd37a8b12a5d174531bc944832f1e7aeef4655df855d8641baea6718fe9251d7d0af3380982c7cbbe28befb148362b6f", 0x3b}], 0x2, &(0x7f0000000180)=[{0x90, 0x11f, 0xb2cd, "504c535939239d2463e937de67f204a6ef7b792e2078f9502919d49f4b24107f4c54dbaf629956d6e022845267a62ffddac920f017545a4e8d16df8a1f30b46d252671bf9fda311b592139215cf5979e2676239860c64f5972398cf8773d97da5072ff1c745990110c103a22ae9cda7d023493ce0effc4b2364eb7"}, {0xb0, 0x11, 0x9, "51af1461edd912e515bd23ce37083643f84343037192ca578abbf44cd324144ec8cae6a55e0dfc0b471514b8275feb035e7edb37704143b772b83c25139f0c39d5f7993324680d7153138335d90b4564782cdcbd234c0a52597cec922260f0de55a4445d77c45e09961837b2ea4f7246ccdd9c911dc186d4aeee92afc4283d0e366362b3e3dc1a05fd35bd07cc132719f3ee80b0b7261aecbb05"}, {0xb8, 0x195, 0x0, "36966a897490b8b55a1d1288734113a67a0f40e28b039e10da11a56b3f7b572947b44893fd70d776a8fe3201b90122113ca621f63931b8db70b057fc6ef93d0b997ad9c04efa300ad9c32dfd3d7e7e7951930b70f6c6c5f632c07369336328c2822fcbb73d0b69c0b8d6bd53b73f1647e1dfdb299a5712227048eb3e1c73c727c448b06bdf7c65c7de62a946895ef4e028ae21d1fe25fd19f84e56c31a70a80f4fd8cdc0"}, {0x60, 0x117, 0x10001, "dfd8113f23c80f033c7f7d3a8ba1758c614890c513548373c8eda02c7d24ef79a26ea47ffea4a40fd71f93e1baea775d5154c859a6499ebe61a114c2b72892d54dfed0bc6126df685fa6"}, {0xb0, 0x116, 0x1, "a283b8f8487ead2242283d6213266bff7f6afd9148824f4927555f1aa0825b7c247d33bf7aedd6027023a8c30494e656a9fa14cd621c3997681516e2959c6f675131d5c0d970d10e44611b18c62d9bfd5dca60b0a34f8190e524a84f6ed591e7de1a51814e8a48bd835876ef55f229fdab44f2d42fdf8dd99b0bde8005514c32b8d971caba24cb15eb05be9e98226afbf1be58f06eba81ac0c90baa5b05665"}, {0x80, 0x3a, 0x1, "4536f28ee78982840fa2c7d34892cf4948c0c4a93a53151c0a8266cb819607d708f67fed49b17696588ffaf9e281c5f9e74191dd16d88d7103fdd9dc14501bd6069af60f8afc5e8e9e503f7dc3276f1268d63b5e6ce0936248e93ee402b469f9c6ecb7d385175546f5"}, {0x70, 0x116, 0x6, "5ff04d6398b1cb5c078fae0a0823f716e80fdfc9bf6ab388dfe6a35707db00a5e1b08f18bcff4a977bc484883625536e463a904ad7db22b7287c9e4d7f79b37af886a13abd54b2b8e77239179095366034e931f9d82ff8b82bf6"}], 0x3f8}, 0x9}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="620074534325d5e9e0afead8b2ff763f83050e2889c8c6291d0820847f985fe71d9a05cb8285eeab38ff265e23c616a71d2bc266bd5114b808a32bc766be452495ec45c879852600d1e590299f9fd3d4ab28", 0x52}], 0x1, &(0x7f0000000640)=[{0xf0, 0x1ff, 0x8, "5e37f1a3406cdfb9da0ff0b3af14fd8a8afb4c30a02fc0c3e65572c4cf75b951410facf83a265972b443d9853d44f2d38511f941208232a38467624434cda71b5949ca3bdf5ead0934dd4ad892bb0717af70011666ce9de9dee28d466133911911fd279e48446cca932938b6fe8de879617076e3232bf5a6f094d0fda0f8ea795edbb071fb4b6fc2a2f0dd0bac0c3a3dbfaf4930f48860b8eb967ad56c8d76fdac2b78a5e4c28f76c48f8d12536aa80cfb8820a5420f8149c401ba479be6a7d436e4e863389738626a3c9c46c5fbe47a64667b25d56f3b1e24cfad"}, {0xd0, 0x11d, 0xa1a, "b06e224030389ca964b4d96df16eaaa5f11f076301b0458576d6b2f4d4bd6bd752c3241f9ab628605ec118eb4994b4a10915e1318768a5d1d41b9805fad8e45a4e51f9c9f409e3f58b0a6fa23279ed13d95260fc55ebdd7ad8275a3a9a0355abf5aa6300ab5343acbda458944bc6bb60b11f2c0a15894c156681a5a384d5f11842bfc1306a517aeac5b757d4a0ce87a49791ef3162a05479988c24bb93a8675615f53fdfc026f1217ed902281c01e02b6e44be059ac63ff83afdac"}, {0x40, 0x110, 0x6, "858c121bfceb9e901ca63f1d2a1069f3a3774ca52e7934d4b70a3c4b9273c1c98c5f6086b0b811ebdd62"}, {0x50, 0x0, 0xfff, "6605727e58b8df8b74d787b4700ad498e2fd5d5609603b0e136f9694745d72924463c445a46e21e47425168b8b780baf94dfd3795456cabe6f5d2aea"}, {0xe0, 0xff, 0xa5, "482640a49744baba89ddbfc3cd6097297fe33e3e916d8e09f55cef00ccd119c0e8847a9f77203de818e1f65906d833aed42386c2389df783189c5e32a33b796b75aeaab70661b9ec4527458bf9f69ac18dfc110240164ab5111f2a0b187a54c4e9896475425ce174fccb30a823f5ec9c23bd1199298a62d17f2be2370666da72e6765c6e759bdca5c7d7e68b3a5d1a078d30450a27ac2a5a6068b631b9545d3dab1389cb631a5b70d0232025688808dc437cec1fa53dd15cd2207ab3dbbb6d6e4abbc00f467c7ccd3c9d"}, {0x88, 0x10f, 0x2, "83b22d16ee962859c2ece31bb3a5b7206b1fb5199f81138e27c600eb0a078c495cfa74eeb1a3e8f6490f159a1bc6a3eac2906641128548b5e50ef7fff772d72285b87f4f9617ff68bb65851c4898a1246e762d16f2bdcfcae16f76760ae0f0e87c4fbca6b4becbd6ca1772b08571f94320"}, {0xd8, 0x84, 0x9, "58dc828056df3120ac328e08dd2d3f64dd51e81387c5050b230cd5bf81c15c85068e2d174985ba6120d7ba9b5605caac79a0e24787bdbced6d361f75d7c02efdc2c78b92138171f8c2b143276c7b6b602c765cc74e60af5ba197f012b73d57ff41f8f4cf9b44ec6bb794f3fdf4deb3ced0df1dd2835cad46975e4f35d54997b4bce6dcb309c05ad68575b7cae9f6eec4af53cc51662df70fc54813da34b975692c0146c40eaac4e26c5b4719b6e84632024b7e7dc856d5bc5bfb9e6ab4d3d4acd2531b9e16391d"}, {0x50, 0x116, 0x8, "c7d68b6b495fd6f6c353e879155cbec5c5c02b5b0738b9e3d4a0a93721930f85dd975b7f06067307c8c756489e9f4f1f6d3d6ff5cf232d3cb5760aed066f"}], 0x4e0}, 0x8}, {{&(0x7f0000000b40)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x6f, @dev={0xfe, 0x80, [], 0x23}, 0x1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000bc0)="287505cd49f55ae5f04fbbd409646a762d3c3a3ccb87d2b2aff66b6cf87562faed0459d851a0c6a657a80f3cc356d15306e17d331087484d2c90be2d9d02a8bb6d03dae41c8537a868de7b180c4ffe8f2ecc520f7736f5b22b3c8fb174304cdfb7e0fd967054a43a20a97b906672c9c669ad594dda0ddf3ddc2b6b39db51cf3adf8ffa6ae8fb138db7cdbfe567af8f1a409ed65e26809a8b37571c987bc52e6cec448edccd12030cb1e911d2d749a2e07965e27c72576ffd7421bcc549591071e89ee7c86201e7f57a6a3e3fe7ae65b9880312e092b4937ec7fc53a2ec7ec8", 0xdf}, {&(0x7f0000000cc0)="fdcc46b3f7c4727dbbd4830680bd439f71f0c03c85898cebd0fc91f004a4a9a8679a0e38b98152c7bb725dc67e54659a6e49edc256583b3680437cd1bc47f9ae931a6dec330440b7d398ac5d52b3e3008b1edd5dc4d27b172ad199485c5f811d2b03ee71a81f07c8e7c4f8497c499db48a98a109f26ec8deb63b460a11c51bc0dfd4806ff8a6f653a90a1cd55dc23b7e2e5d46ccf63b", 0x96}, {&(0x7f0000000d80)="b9e765b3c2ba39489e3945c57330d92049eca921ae58b21256172e9272ddeca3087c1c6b75f6f3a797b8fc060f4301401287407481383daabbd4ddd74c1f8c1eca474075a3263d748d4055c3ca448dd7a50b7b5c5bef65673e9e1e5ce394e41f", 0x60}, {&(0x7f0000000e00)="81b8d427194cfea21eaefd40870ed72a459fa185df5ca23d774aadeb92179248cc41e99fa7aaaaa3102532c30c640c17ce9bff29ae6d0d160081d79b655ac17c34bcc35b6a91762a78cc63283cf01492f3e06ca36f8e92e2c79ac0ac7f75944d595a83af52517650f6f1d3adc7ab5fc6e724d633b01400c910b00fa35a97d19c28a4bea382d48dfbeee3bd83b2c09fb0803f02", 0x93}, {&(0x7f0000000ec0)="5b5221a89d61c0a1807ecf4ac6945680fe0c724ee43a70240fb9b9b9a4386c59268292f204ef07bd4c94648eb132962edc4ed7fa505804af587bab9a4249021ecdadaf324cd2b3b543d31f2c6135d41b107817f7f69b1c843c1107df51808b4e9a1f92a0f6afc6b3f6dab63beaead05039b2ac14b054c986c0a2adc157ab853fcc982e550519d802d3059631e32f62ad6fa6492834bebe6a60352846a7cb1c1a0119a08546ef8855bd1c88", 0xab}], 0x5, &(0x7f0000001000)=[{0xf0, 0x0, 0x7, "4d092735bcbfd53bfc460aa83fc8b6ca286edca70d766a6fb64289a73a177b81027b140b9df9f5a0128dfbda82dca4a9589c636b90cc3dcdbf4cb94a6378ca15b75d50f08e3e2cec7097e45329193dc62e915cf87aed95706a978f57625f70fa6dfed232b24b51b334ddc2deed650e0b096c6c183ad7cf3c5bcbcea29abaebb30007c8dd02433cca3738cebd9fd906944bb96940c75b221d838ec654a585f5dcd08aa0965aaa90931ae706b3422b565504eaf0d3c218991fc5946092c37a17f9b35d17890eedfd41e77ecc248900535c46a32c18a4b5fe423e3c"}, {0xe0, 0x0, 0x8000, "6f8eeb368a46f369b5538806abd6d84f831b585c6fc5e4e5121e9494d11a78781ca226902fcbd8a05e0b27ede08adf0ae4d922399e64b9a67f50c5a253b37c489256c712f3b9d35425aa93134a4856f43da19f4ab59e210c46e808b66f6bff6bb97aaadbd54d3b22fedd24d734910cb4e9a8be639a0fb0b751562edbc0843d641d5d23024c5f29180fdfe68eba582db5629da32985d4b3b29b2cba6ad05390ee6e87e43c24db7fb13d1583859d306c9ca5c511583327b27a238bc634fc3aa9421d58cd78d5b06ff10745965c4f5aea"}, {0x10, 0x13f, 0x3}], 0x1e0}, 0x4}, {{&(0x7f0000001200)=@sco={0x1f, {0x7, 0x4, 0x9, 0x95bb, 0x28000000000000, 0x80}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001280)="fb6e336175e80443a9fb", 0xa}, {&(0x7f00000012c0)="e905d1d8c517b2b52ad00f6af37b0165da95d9d18a6f88556363edf25f42dbdf89f42892e88f8e4c37b56a19eed2ccb9bebf585299a7e9e45f78f40336b9", 0x3e}, {&(0x7f0000001300)="12e314f448738efd", 0x8}, {&(0x7f0000001340)="a063562368fcce3ec6d2f8223a53ab8a19d1e0c72738d82b2efe694ecb8a25a5046e434f796d1c7f9cb86891b3cf8d13658bf499419390e161a3c6f526aa02b030255f579056448456ce3be45d2c3c4631f66f3ef77b53cce0d58dbeabc89135a83c8651cbb8eaba5790f4b596d88dc264082d13cf6202b2952f810d36aea335ee540547baa788a4e7d2d6de814737e0be13e9c10d836682dc0e26c4e9760cbb64ecf4f59f7b7751bd1f0116217c0a3bacd741918bea20da850ec9", 0xbb}, {&(0x7f0000001400)="985e900262e469405ad6c2b5eb74cdc3efd4ff540ec4dff18e8c2ea2f8964360a4d5712b6764e0dd516e3514a8330135f8a855c27b3e1004ebb895e22eb854ee642a8e7daca7975c9beabfca21c3121819b52a65483b3686906310e04b713fdc793cbae4aa8126325fc50cb8de7333a4ac5e446827e9cfc933", 0x79}, {&(0x7f0000001480)="34b1240a96a0071f5f48beeb27a42ca9f9bb32c7494c66cf466c9d785ffbf4c2cda69ed7d6171b7e31913cd5a02a0072e141a85486f4d0b8ed3da222e6c57adccd59d3f4fb900fc4324522ae48906ded5d366fd451cdbbc208b7e2e661f2743b62c54c092b74049a939bff2206eb1f0c7bc269ae8764ee8c9e6e192b42ab4df8c84433794983105c463299d0817d2adff925ac218a2a85ea57fa6104bbc094665f626f52b7341c26a7a67762c6d5d4f04832d8c88cc10bc8f2dc47e6e1062f84da0220b953089540c770811b0059ebf75717bd979760d930bc95ad69346001727f4b9421830c312bcb22d00f581bd29836aed42ccfd87f95c433754fc547559a0415299dbd9a311122e6a9271ccd67bb349329190ecc594501685ba2001beda037f67b8b83eab0bcf3ae686cb725ceede407f94962f0e9fc4659c91400cf296ac1accccdfa8a63130766abbfa1837de26e81286008611c035d73d9b390aa3434e284e1718582f21a19980e276bb8c0b020c0f1884f5c6a74d88a1752efe7c0adcb268afbe430a175dd6a2703e5993b42ad5f1dc13bae8c3d6f15959b8316acabec30d44f57787e8b3211a1e9a9a3926b44e1a9a632754806e8b429dde5a3e3fab532a9e484f1aeffbe9257be379f25319afc7e2af4ffdfd6d2525aa1f68568b5b3779155f628623b1426d5073ff615ece64c0f83f6826140f0ab145f9c87becb2f790e78014104e6faa411c6bdfa5cfdcd054b2145135dac4f33ea94e0b1b0967488818d449c4a05ed98c4f68dc0e60f64490f9441ad4ff8f82935f8cfc705195e23e472861cd4937d6d8c29da0c8707def451782c3ff38afdd62fdf7f73d3b194928bbf0010817b4c1c5f0057bd542def154b2abdeb513986b6116d22607a8e56be97c8a06bdb9c051560b87def5aa1ef737b10f0b4e98eb3808d0ec96076089b805319524b73be8392c3de2cf1040ae25c04251d123a864314f803dc1ddff53191ead51a370fdba1e7d630c904b05fbc1fe03148737e4c6ed7bd99698597ed76ce75c8ae055c26096b23db1e206562db60981b807c12ba36762b91c7d45c754f569ec6b812a908e7670ddb34707807fd07419b3a0d09f6c2418af3cded7f37ffeebf9e29db53241dd14eeaeecca807ad312019ee1dcc069a9a01f8578e32655af86b92a172d91b1bc9398e14a15f3cc7324fb34b05b198c7f3bc51712fa78c1c07920f135d511670a6fe4cade62f0745bdab998c595582e4a7bf5f1c455d8c246ba0cf156ea845e8ee22c892f14d5e955008fab8896822f6cf2a6187a65a1c4ebb41759b53c7f0f45f402e914643e48ac4e15b7a6e4ed0325c4554896026e78ec3cd89a8102c541f513c63bc9dcdffb523193a3285abe866b83ac51789b27b86461ac462e9e85bb796daa233a5c7454c9390b1773a43cc3b9e06a7f2cbcb5292afafef93ff0744cbd85fd4345a40a156f9fcd13c011891bc1045f27e186b2d39a7ebc58de80cc7891900c292f21e1a337e19b49e09b125777872457056815c7f3e8717415159e12d70a241ee6c7b19b26a7c611502b3c9c62f29d515d26d8fb6d6ab51f450ebac3dd9ba7a4ccd2d75926828d822700aa0495b3adefd5d7ca390c74bf036d65f431aa89e4c200254c2d633ffe17c6467a06f1ee7f290980aac8279c38e168d1de58f82f8056e0eae3811a0346db58edec5c7243fbfa264f8d7771683e26bfbe99aed915c9d11dd8e16fcdaee8b75f949b30b30be5ec3362b24be4cecb9a50d22b1fec770b8b5722ba2ef01570b794b789cdb44a5a403a9ae62c6a0ace2fceaf9c65eff7d3399f6d5aeae97d5cc02ce854a59c3db3bf2134f723241ce17084cddba7993410ef72f77274c1ad834380b357b9e46b369472ae094e8a947c7b9fa2fba909a539065d5b95cbd185a0893540b8f5758016a164be2ca6f51313574be0a9a31d40b5e468dd96b96f771e55efd46adedc8cc8767cb042d63510652b376942872984628aaa66529d5b1e1390d02ddfadd1ca0f5db5268afbb41c6a1545580826aa8acfb94f0d4d2dfd22d0f94c826e5d84bd36935159acb3fa3af47cb06a44e6bc570eca5d16c3e9423af0f3cc17ece42acf178e26f69b3819ca904f91d3f32a22ef851501195c175c747a4430e2f18802828f75e108e7a5d3177f25f413b6cfc1b7336ea468d3827a8fb27514bbb2b22a4540693bfdd63727b217ddc2e23a59c952797d8c01304954c7b009cb3344372b4585998aaaafe6e67df3a1e2166ed1179e9e60f0e6f2d27795bbe02fdc66b599742465c31274b0c6c07ee079b99d768b62c36c456ed39c36c226d378c4fc7ab76c78a76b1bb131282bdfece6bc4cfc7ee8a5e7a85e538ab7d05a45b649b0ca0e4ddb77f2c03e4685dc8238a67e30a6b805e8f62566b1a1937a2dba3071f47b2937ec1ce017f8aa88a23215f7f7463be92c51f37628b2c33687bd2b7d6a6eeaaa5a46e4a2175fd06e013e5e59b049976e1f9117b37313fe7817e256861beae50892088ea5abd173b38565d3261f3bf9a792d96060c489f1a919e2c813d0603913cdb169be31d044eaa8a67223ae6a8bc7f4265e422d5da3d6107967726e22ed55af4ebce04e4d1518106210ebe64320ae36c0ecbc44c9affc573588696be4232b61dec90bd7136cdd35c57a9fbc3246bd6cadb3d31dfd6e3e13909bc8de6f39a44f21f4a13c91f7a91832aba1447c85aec84bfb9eed9082debb7f60903e663167a58d2885a1acee2f245bf9f8b1e2ca7f475428d3889c0fcc2655c7796f63a626dea74db4420db6b4b6d1699aea2501bbdf1c44fa86c15821970821fa62d622b8a1a2deb3c8fef7e39ba2f484cfe1987f1ce4f14af4b4baee71a21e8c395e2b517d7d463e3e6ec80ad22d37be9e32856fd85b479bf2c9cea6848ea265846cc0b6ee362aca1d78843cad96a32268c71c9012880e70822b228feb9c628a1092855aef825d44dd55676e66501b4b659845ccdac44fc63c55a989826492f3ed7e55b33dbca1e593eaacb77b8d299c103bb5ea5ed08321df598dec9faada36426e6c9bfdd5e9b1a955151045f1638df328389c2dccbdf5d175e6cf59220deee57b97db2451d6964ec476f0c26d51870f0f8ddff6167e1f88842473db147bc65f678c4e93ad274b484952d04b06cf8116d5ff18fa3aecbc87de4478eb9a4a3e9754dc6e24768760bbb7f9840183eeee475f550b6e994b3d0743b6c84de1693e4589ffd64a84d7c1794b3a8770aa588cccd006313a7392bcffe00242389c6db9a3095bcd5bf53b6f84ad4270d8aa76a9bbc045fd18e1ac538ce0af0bf9c9041d91437176d7073a15d0528923be49f622d3a7f0a4fbf735c068dbcd7f50cce627265aa0e7d56969fba7b0093eff658aa22fd715e88cae2d767f9593c6aa3390f9fc594f739bb89ec4f22444369301de8890de3660b24c18170f5d3b2589bd63d1b0d07dd7dadaacfc42f69e07216a1df4321629de9c111e1b5feec0de364ac6cd7b222affbecf124522f5515a4955a42808a614e8ec57704538b6777670e6df9df0408a3e4aeedc194e8f776cab973b8eab2cf3a4ba201574f13e86a4f372242d4488c6fa88872efcd9e572eb1437da1b210009373a7358505d791760dd3823b7f07306d4d88827e4cab6a4c913a22747deb4c53ad9a0efb220eccee9790a94d97fde88f7afe795654284c44abeee4dd40f29b28e5bd8423eda8b410ad5ccc62f810f096e124235743f20e6afac887b7459bbba79332d055cb566568dbd91db1f0ef08df41eb7683afef3d2315d5d5609c108e9620b9a3920e024b42fc3058bff1b263915e30f90e57c76cba18594f8d979f6ad589c2a90e951ec80206bc45dfb6297c9579b3df6b1f60ca63c5b5fd6e709210c89d031e0f1aeb0e1e105138bf696753202ced609299a5dc6bd67d464d2b628dca7faf8e4bd9f255ed09eb976210a42f8280680b65449683f49125509233cd258cd10f696b770fe694dff9ffe3972ad5e9cd451bea099a0595277acc94a8def8bf11fb534bfc30f2f80536de0ceacbb12f9b161019b6a1a60d07d67e8ec38c4e9e780eb149cb9094d023c182c936dff000d033399cb7a1502b1b52e4982ff973043e1b4ff355431732f3c0a322e7db579166e7e8c89fa07e73f38343b86df54fd96d5cb0af52bae0fcc0a616af74d327fc06935b0197379486269b9286f971bcb250d28cff9c149f61c6e6bcc2f241ade72c2061638a95b1b7f85f6768dd2787055f5b8b4764799c3406ffc59c3305894a8427f06e325e2f774f2e3ac1cd4ccd5e45ed6ed1876d583506adbb625b32400b77297f527b43d3c704aacadb83734218449149c16330a466593d922745567d2078c234bc9acd258a2a3a3c806df97964ae44496f7571116ca49573ab99b081dd6effbde734f4a7bdb179efc8beba06fcd19c6d5f2c9f0cf645291953d650fcf627eafd7ee822be4614a16234d9367263a806b83f7448185eff9e8e63a05f67c08cc1999b9ebf8fa96c1635210d332f052b75e20bd66c8f16049dd0dbb55584c9d8e7b305d79ffe8beaa58356a110fb0dba8bb649a94c4841e2f3fd8b96ea079ed67429cff2aa7e9a2a4e9d015daee84119fc752dbaeffe8c9115105858e607c9f0d6df3a36a19db109dc5f61adc29ca90428b9fe707da02ba8a8ed2c7430de2c8e3efcc598f327708f563b5201c508c9cd213814704345da83498a80040009bbcc24fc69212e946a1b56ac03b9551f1b2497d24ea8a8ec35dc62faa5e7c01aa5510fd7e31452dce8eaebe29e0d277b008cfd4b97da89e1b0a849db006dee3d8665dc01b2f6b0939d1b95bc4c21fcdcce069155758eceb79e401484fa5faf2040a8c3f0c2d979de3fd8cc323641981f78bce00c96cc91b795df4a2220ecbf62ca1c3c8e99ad7c7996ec822b946804f4fdd889317e956c70224d6c6eba369211cc40f3276eeafa776394c78c2d840aee46b925677f1309dc715acd7185ddb5404f2802c415ce3863f20fd4cd7e4da7bf7526a18531f4179e5d57208cd435d5bea33d602951360503c7c73b2ee69d30e32efe1b3e98d93855ee564b182e93afad34ea2f85c2aa22fb3d3aeab267a88c056917576b61e2bd629a69e1f3df0843a0a342140504acd7203b631724c7f2b41f5f92c0e05e506c88e396a54d3dd14e32f22a0c4fc6daad51e55a73245f73af068118ae9d65e29a16ecdbaebc01a29e1c54903b4ef042b359e2d87c94f1f4d813ce84f2326633ebe583d54b77cbe7c3768e787ac7418a734e690ecf13e1daf2bc3367899cbb39b973bfc006d602e465fb1ce7d60819a153b384c3afa148f0a8f5b9d2f9329cb602587702222b2c8debcb7b0753c1063ea3b3498890ef7fb90dbb6bc40b0d9b815d4f678fe0b083d4d271975cd9a65dd0f3a28902db762ee530e3782ef3a9d39d7f47e6bbc5c6c5d1a5cfb9a328eb304258d27f3df44d75dc7cf1c730605c40b2a9ae8c534a430b4daf56f63ff692a203806e6c77c943a1a2a4eca4ccfc1376814d03c9e3514399f7d0e1ae9d8f85785277dc1739d1f84f03d91800146221c00a2088d52fe4f3295f7c6bd3a51518be937604324387b17657c1ba40eb6289f6992fe93645d2227bb20e7e64dd5cd547b810d3cf6eb8ea85f262c3028bc311a2cb6c23f7b3eacf81d018792110693c926bcc578e547c52f7fec03302ad3d4b96e859f1f39847aa00f711e89e7cc3bc0c159542314334596dc5ad64875b14e98d97f6389393abb0dc3f1cd8d7a853a4bb17fbf4", 0x1000}, {&(0x7f0000002480)="751987c8cf49218d583bc94115eff57195adc0f6fd236c566193cd14e3dcae47f24acfbfeb88df0aa8fe3a1fca2d4daf7a2b2b1ccb19caf5752b79169bbe6121c990b30d257c97c52886b9a2ddc68c039e787660472904f54d497c8515ca041238e0c9dbffdfc9db275fb1a766336352ff8cffb10e02309a25cbe2055ec2c0e24b9bb565e5822b1176fb7bf6116e133667b9b9f765fd55f16736ceb96a4d4d6a9a1430d16e1124beba25b340f46975bbf6bcd32555ee0fdb8aec", 0xba}, {&(0x7f0000002540)="7d6ad8494230d79991d0adcf1e2d82b9323d107df4961b15c43dfb2d8e4a423bca6f2c399ed90ae06d90af2aeff7fb19177dba0041303b3bdc0123557400e5604762a78c8bcefb503f61440ede748bbab441", 0x52}, {&(0x7f00000025c0)="7e83e5b71f29a7f98f7cc5d99f97b98655b5afd01d9ff21895268ce5fed97380359b3bf2dca111e7a2ed6852bd3c2e3338e6888f24d790f788c87e2a9f11a59d6324a481553e22f9795c2be0a2033184a959d9761dadc8ebc9", 0x59}], 0x9, &(0x7f0000002700)=ANY=[@ANYBLOB="18000000000000000000000002000000b50c6ab88326a327e8000000000000000a0100008b000000749192b10d03ee994b0b5c2578bdb37a7bea63893857d8095ea69b31f96868e884d1824e9e910392e4117f0ba0aa360d9d90582e3b6e0bf996eb266a50309c940cd8f182625e01a9bf9caa3fa6e86c629532b4fdbdee86d4b6505c0027c7f2c6bd3379809c92a8ebad576fbdc965f6e200cbcb87cf6740f2a4f43ec79f13c520e123dd133131285da3481c60a99dd77aaacb1a0e3094b7bb1ab18592f56bc08f53806f5e214a97b0973e532c94d9ab08aed757cf195846392d9a229706c62ea8deda80fcfe6e182d5010bd30e2c992a8f27d0468e5142a00a00000000000000009010000ff7f00004c205237b0f27aa67d45cc7f409500ac9f1a178214a7c9702175adb0b3468a82b07453a1ddf3f9d40a4333d7b853ed0f50f3d3d693a1a67088f4eba0436c1c59b1f08cd7cf4e6aa6d0a02647b2e46e999c8660d671cd6de3f149e7c80ae8b403c3bc803afa0aaba4ee560476fb7e9a6a9ab164adfab60fa51ed5511de3e859a6a1c83420a840cc1b4db1f28efdc18000"], 0x1a0}, 0x7}, {{&(0x7f0000002940)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="3d33a147eb7b7459343ddaed0e78bb04fd64fe571f", 0x15}, {&(0x7f0000002a00)="d62f75c28e23f90ad28e4adf8a5ae971bb77ace4dcbec9a303c7efd4891a9a7674697624ba5b3a2e8e3e22e2a48bfae769a0501e74f1a70733ad314629a26ea9b04bea8defb7a70868ff69ebb70b", 0x4e}, {&(0x7f0000002a80)}], 0x3, &(0x7f0000002b00)=[{0x78, 0xee84e6d63f74349d, 0x8aa3, "fe16be985534f2d56eb081d515da81642e1bc3ce411c6b3aef057874f7c64bf2dd320e99bdc8473a53f3be5b78a8431ced4eef327ba8da692c5138dff7650285fafef432c26bdba7eb6d481603fa24e350e3de4d70102c1ca8b4524745c26cca9693"}], 0x78}, 0x100000001}], 0x5, 0x40) [ 692.539880] kobject: 'loop2' (0000000069b92919): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 692.551115] kobject: 'input1298' (00000000976699ac): kobject_add_internal: parent: 'input', set: 'devices' [ 692.565353] kobject: 'loop3' (00000000c2e60c57): kobject_uevent_env [ 692.571853] kobject: 'loop3' (00000000c2e60c57): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 692.582174] kobject: 'loop5' (0000000014f11e9e): kobject_uevent_env [ 692.588354] kobject: 'input1298' (00000000976699ac): kobject_uevent_env [ 692.589801] kobject: 'loop5' (0000000014f11e9e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 692.595952] kobject: 'input1298' (00000000976699ac): fill_kobj_path: path = '/devices/virtual/input/input1298' [ 692.624333] kobject: 'input1298' (00000000976699ac): fill_kobj_path: path = '/devices/virtual/input/input1298' [ 692.631431] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 692.635076] input: syz1 as /devices/virtual/input/input1298 [ 692.641858] kobject: 'loop3' (00000000c2e60c57): kobject_uevent_env [ 692.655586] kobject: 'rx-0' (00000000eaea1c32): kobject_cleanup, parent 0000000070c50ca7 [ 692.657525] kobject: 'loop1' (00000000502a6fcf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.664289] kobject: 'rx-0' (00000000eaea1c32): auto cleanup 'remove' event [ 692.673666] kobject: 'loop3' (00000000c2e60c57): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 692.681923] kobject: 'rx-0' (00000000eaea1c32): kobject_uevent_env [ 692.690324] kobject: 'event4' (00000000988cea78): kobject_uevent_env [ 692.696787] kobject: 'rx-0' (00000000eaea1c32): kobject_uevent_env: uevent_suppress caused the event to drop! [ 692.707116] kobject: 'event4' (00000000988cea78): fill_kobj_path: path = '/devices/virtual/input/input1297/event4' [ 692.714069] kobject: 'loop3' (00000000c2e60c57): kobject_uevent_env [ 692.734199] kobject: 'rx-0' (00000000eaea1c32): auto cleanup kobject_del [ 692.752951] kobject: 'loop1' (00000000502a6fcf): kobject_uevent_env [ 692.771640] kobject: '(null)' (00000000a6bcac28): kobject_cleanup, parent 00000000988cea78 [ 692.792453] kobject: 'loop1' (00000000502a6fcf