[ 29.699129] audit: type=1800 audit(1543326086.473:27): pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 29.729096] audit: type=1800 audit(1543326086.483:28): pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 30.406832] audit: type=1800 audit(1543326087.253:29): pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 30.425711] audit: type=1800 audit(1543326087.253:30): pid=5910 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 35.290826] sshd (6050) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. 2018/11/27 13:41:38 fuzzer started 2018/11/27 13:41:41 dialing manager at 10.128.0.26:38673 2018/11/27 13:41:49 syscalls: 1 2018/11/27 13:41:49 code coverage: enabled 2018/11/27 13:41:49 comparison tracing: enabled 2018/11/27 13:41:49 setuid sandbox: enabled 2018/11/27 13:41:49 namespace sandbox: enabled 2018/11/27 13:41:49 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/27 13:41:49 fault injection: enabled 2018/11/27 13:41:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/27 13:41:49 net packet injection: enabled 2018/11/27 13:41:49 net device setup: enabled 13:44:43 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1274, 0x0) [ 226.507140] IPVS: ftp: loaded support on port[0] = 21 13:44:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 226.774377] IPVS: ftp: loaded support on port[0] = 21 13:44:43 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) [ 227.140851] IPVS: ftp: loaded support on port[0] = 21 13:44:44 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f000043e000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x90) [ 227.619517] IPVS: ftp: loaded support on port[0] = 21 13:44:44 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000035000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000001d00)="ba430066ed650fc71f64660f7d9c00800fc758e0b8620c8ee02e66660f560fc17738000f323e3e2e0f00150f07", 0x2d}], 0x1, 0x0, &(0x7f0000001d40), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f00000003c0)={'filter\x00', 0x0, 0x0, 0xc3, [], 0x5, &(0x7f0000000240)=[{}, {}, {}, {}, {}], &(0x7f00000002c0)=""/195}, &(0x7f0000000440)=0x78) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x100, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) [ 228.243781] IPVS: ftp: loaded support on port[0] = 21 [ 228.247828] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.284930] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.304875] device bridge_slave_0 entered promiscuous mode [ 228.419963] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.429001] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.445918] device bridge_slave_1 entered promiscuous mode [ 228.459160] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.485469] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.492858] device bridge_slave_0 entered promiscuous mode [ 228.566895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.617286] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.631312] bridge0: port 2(bridge_slave_1) entered disabled state 13:44:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x10000000fc) clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00', 0x79, "07bb0c67a88f24c792e381734f212daba98f60c0f884e13ba19e750da79ca49d95e007a5a4aecb358d69037ce683c298aca9023c0b6d0c41b81a9f411859d008ce34b48e5b04de2fba5e758b9a376940205f64d4b0dbf2846afa602a266ed7b3645446b15f05e860ac1750e449036c024446b4e6346f29b0c2"}, &(0x7f0000000000)=0x9d) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$sock_netdev_private(r0, 0x89fe, 0xfffffffffffffffe) [ 228.666262] device bridge_slave_1 entered promiscuous mode [ 228.735548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.752897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.875437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.953419] IPVS: ftp: loaded support on port[0] = 21 [ 229.172193] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.264723] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.358118] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.412875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.424050] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.432923] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.453298] device bridge_slave_0 entered promiscuous mode [ 229.578066] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.584419] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.598365] device bridge_slave_1 entered promiscuous mode [ 229.619653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.640066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.648707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.673969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.747284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.849094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.014709] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.039621] team0: Port device team_slave_0 added [ 230.048726] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.060029] team0: Port device team_slave_0 added [ 230.077859] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.084230] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.095755] device bridge_slave_0 entered promiscuous mode [ 230.173929] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.196070] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.203370] device bridge_slave_1 entered promiscuous mode [ 230.219412] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.230464] team0: Port device team_slave_1 added [ 230.256264] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.263661] team0: Port device team_slave_1 added [ 230.289754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.342710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.395628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.404565] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.454041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.473869] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.512596] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.547541] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.561170] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.576544] device bridge_slave_0 entered promiscuous mode [ 230.597126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.645746] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.662981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.677427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.689583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.706350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.724965] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.731335] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.763570] device bridge_slave_1 entered promiscuous mode [ 230.775531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.783525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.804673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.817513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.828342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.866747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.883169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.898676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.908098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.919764] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.938534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.965612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.051604] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.067012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.173320] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.381170] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.389918] team0: Port device team_slave_0 added [ 231.408452] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.417751] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.435975] device bridge_slave_0 entered promiscuous mode [ 231.516087] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.559359] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 231.575833] team0: Port device team_slave_1 added [ 231.587706] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.594065] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.616513] device bridge_slave_1 entered promiscuous mode [ 231.718508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.732454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.754936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.771103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.804938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.824695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.845819] team0: Port device team_slave_0 added [ 231.852869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.864918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.876332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.893252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.910588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.926238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.995059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.001890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.034610] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.052316] team0: Port device team_slave_1 added [ 232.079390] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.100428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.126262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.197765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.216810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.230075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.248096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.258399] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.264943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.271882] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.278305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.294554] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.313650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.321770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.376270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.397908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.435227] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.456396] team0: Port device team_slave_0 added [ 232.518909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.534384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.550607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.571888] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.587275] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.593635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.600351] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.606749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.619215] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.635673] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.655323] team0: Port device team_slave_1 added [ 232.675573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.695441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.704682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.735604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 232.742469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.765800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.773651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.790682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.803137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.827061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.845760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.863918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.883652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.904681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.933660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.025856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.033103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.041834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.158683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.184439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.200987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.238200] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.254259] team0: Port device team_slave_0 added [ 233.357992] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.366837] team0: Port device team_slave_1 added [ 233.448787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.555798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.659536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.675968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.683964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.795389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.802530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.815297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.917951] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.924314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.931065] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.937505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.955708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.139998] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.146408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.153062] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.159535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.192436] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.624673] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.631111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.637885] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.644277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.684012] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.735253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.745810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.775776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.396250] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.402646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.409361] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.415768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.438208] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.744918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.885890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.236788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.375727] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.763309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.911516] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.938787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.955963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.996875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.204325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.255834] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.261974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.272676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.474981] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.483942] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.631377] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.728917] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.016971] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.028654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.044052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.082822] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.095243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.105643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.128821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.520577] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.538424] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.597387] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.765209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.089227] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.100716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.116154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.269192] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.652736] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.721450] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.745073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.752135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.144936] 8021q: adding VLAN 0 to HW filter on device team0 13:44:59 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000180)={0x53, 0xfffffffc, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000200)="5f39801d6ca5", 0x0, 0x0, 0x0, 0x0, 0x0}) 13:44:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc2604111, &(0x7f0000000080)) 13:44:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc2604111, &(0x7f0000000080)) 13:44:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc2604111, &(0x7f0000000080)) 13:44:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc2604111, &(0x7f0000000080)) 13:45:00 executing program 0: socket$inet(0x2, 0x3, 0x6) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7bd91397917daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360b00000015739d53d5"]}, 0x48}}, 0x0) 13:45:00 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:45:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x20, {0x3}, {}, @ramp={0x2}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x15, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 243.498330] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. [ 243.542084] ref_ctr_offset mismatch. inode: 0x4093 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x8cffffff [ 243.570862] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 13:45:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000034c0)=[{&(0x7f0000000b40)=@abs, 0x6e, &(0x7f0000003300)=[{&(0x7f0000001000)='L{', 0x2}], 0x1, &(0x7f0000003440)}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:45:00 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$sock_proto_private(r0, 0x89e0, 0x0) [ 243.586783] ref_ctr_offset mismatch. inode: 0x4093 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x8cffffff [ 243.683764] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 13:45:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24008000, &(0x7f00000000c0)={0x2, 0x1000004e23, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x1, 0x4) r1 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, 0x0, 0xa00004000000002) 13:45:01 executing program 3: perf_event_open(&(0x7f0000b5a000)={0x8, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:45:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r0, &(0x7f00000003c0)="0403000000c000ddb8460900ffb25bc202938207d9033780398d5375c5f73f2e5506dc5712f29513f06f8f6575efe5eb8f5972eaecff8b307756e195", 0x3c, 0x0, &(0x7f00000000c0)={0xa, 0x100200000800, 0x8000000000005, @mcast2}, 0x1c) 13:45:01 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f00000002c0)=""/148, 0x94) getdents(r0, &(0x7f0000000200)=""/139, 0x8b) 13:45:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x2c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 13:45:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="23307a831e40"}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 13:45:01 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x4e20, @multicast1}, {0x307, @remote}, 0x0, {0x2, 0x4e21, @loopback}, 'sit0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0x9, 0x0, 0x0, 0xb}, 0x2c) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000740)={{0x2b, @loopback, 0x4e23, 0x4, 'ovf\x00', 0xd, 0x8}, {@rand_addr=0x5f8000000000, 0x4e24, 0x2000, 0x2, 0x5}}, 0x44) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) listxattr(0x0, &(0x7f00000013c0)=""/21, 0xffffffffffffff97) syz_genetlink_get_family_id$nbd(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='cgroup]cgroupGPLposix_acl_access%@\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000380)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x26, {0x2, 0x4e24, @local}, 'irlan0\x00'}) [ 244.444722] device veth0_to_bridge entered promiscuous mode 13:45:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae0a, &(0x7f0000000000)={0x400000000000015b}) 13:45:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4, @tid=r1}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f0000000480)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f00000002c0)=[{}], 0x1, 0xffffffffffffffff, &(0x7f00000000c0), 0x8) 13:45:01 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) read(r1, 0x0, 0x0) [ 244.535349] hrtimer: interrupt took 31142 ns [ 244.541204] device veth0_to_bridge left promiscuous mode 13:45:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getresuid(0x0, 0x0, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) 13:45:01 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102801ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x9903000000000000, &(0x7f0000000040)={0x40000000000014, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, [0x305f, 0xa, 0x4000]}, 0x2c) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, 0x0) 13:45:02 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a7c2d023c126285718070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x12, 0x0, 0x710000, 0x0, 0x930000}}) 13:45:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0x1ff, 0x4}}, 0xa) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000180)="14a4b1930300dba293", 0x9}]) 13:45:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup(r0) write(r1, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 13:45:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x4e20, @multicast1}, {0x307, @remote}, 0x0, {0x2, 0x4e21, @loopback}, 'sit0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0x9, 0x0, 0x0, 0xb}, 0x2c) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000740)={{0x2b, @loopback, 0x4e23, 0x4, 'ovf\x00', 0xd, 0x8}, {@rand_addr=0x5f8000000000, 0x4e24, 0x2000, 0x2, 0x5}}, 0x44) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) listxattr(0x0, &(0x7f00000013c0)=""/21, 0xffffffffffffff97) syz_genetlink_get_family_id$nbd(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='cgroup]cgroupGPLposix_acl_access%@\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000380)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x26, {0x2, 0x4e24, @local}, 'irlan0\x00'}) 13:45:02 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_to_bridge\x00', 0x36b) sendmsg$unix(r0, &(0x7f0000002c80)={&(0x7f0000002200)=@abs={0x0, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000002c00)=[@rights={0x10}], 0x10}, 0x0) 13:45:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup(r0) write(r1, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 245.475073] raw_sendmsg: syz-executor4 forgot to set AF_INET. Fix it! 13:45:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8f7150d000048c95c671a4ee900002069a27fff"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='W', 0x1, 0x40844, 0x0, 0x0) 13:45:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup(r0) write(r1, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) [ 245.648168] tpacket_rcv: packet too big, clamped from 81 to 4294967280. macoff=96 [ 245.816915] print_req_error: I/O error, dev loop3, sector 0 [ 245.822855] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 245.831086] print_req_error: I/O error, dev loop3, sector 8 [ 245.836947] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 245.844621] print_req_error: I/O error, dev loop3, sector 16 [ 245.851972] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 245.860085] print_req_error: I/O error, dev loop3, sector 24 [ 245.865941] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 245.873641] print_req_error: I/O error, dev loop3, sector 32 [ 245.879524] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 245.887244] print_req_error: I/O error, dev loop3, sector 40 [ 245.893051] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 245.900760] print_req_error: I/O error, dev loop3, sector 48 [ 245.906609] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 245.914843] print_req_error: I/O error, dev loop3, sector 56 [ 245.920654] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 245.928371] print_req_error: I/O error, dev loop3, sector 64 [ 245.934194] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 245.942834] print_req_error: I/O error, dev loop3, sector 72 [ 245.948684] Buffer I/O error on dev loop3, logical block 9, lost async page write 13:45:13 executing program 2: syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00') r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000080)='./file1\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @multicast1}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0xde, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:45:13 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = dup3(r2, r1, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text16={0x10, &(0x7f0000000380)="66b8003800000f23d00f21f86635100000090f23f80f21760f01b700103e0f01c9b89b000f00d0b859000f00d866b80500000066b9867100000f01d90f51a503000f9217d24331", 0x47}], 0x1, 0x0, &(0x7f0000000440), 0x0) 13:45:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup(r0) write(r1, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 13:45:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getresuid(0x0, 0x0, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) 13:45:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000004240)=[{{&(0x7f00000011c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup3(r1, r0, 0x0) 13:45:13 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x4e20, @multicast1}, {0x307, @remote}, 0x0, {0x2, 0x4e21, @loopback}, 'sit0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0x9, 0x0, 0x0, 0xb}, 0x2c) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000740)={{0x2b, @loopback, 0x4e23, 0x4, 'ovf\x00', 0xd, 0x8}, {@rand_addr=0x5f8000000000, 0x4e24, 0x2000, 0x2, 0x5}}, 0x44) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) listxattr(0x0, &(0x7f00000013c0)=""/21, 0xffffffffffffff97) syz_genetlink_get_family_id$nbd(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='cgroup]cgroupGPLposix_acl_access%@\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000380)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x26, {0x2, 0x4e24, @local}, 'irlan0\x00'}) 13:45:13 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00002b9ff8), &(0x7f0000cbeff8)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, &(0x7f000002f000)) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2142020, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x80000000}}]}) 13:45:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000004240)=[{{&(0x7f00000011c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup3(r1, r0, 0x0) 13:45:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x10000000000000fd, 0x2000000000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/if_inet6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:45:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f00000002c0), &(0x7f0000002600)=0x4) 13:45:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:45:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000004240)=[{{&(0x7f00000011c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup3(r1, r0, 0x0) 13:45:13 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x4e20, @multicast1}, {0x307, @remote}, 0x0, {0x2, 0x4e21, @loopback}, 'sit0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0x9, 0x0, 0x0, 0xb}, 0x2c) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000740)={{0x2b, @loopback, 0x4e23, 0x4, 'ovf\x00', 0xd, 0x8}, {@rand_addr=0x5f8000000000, 0x4e24, 0x2000, 0x2, 0x5}}, 0x44) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) listxattr(0x0, &(0x7f00000013c0)=""/21, 0xffffffffffffff97) syz_genetlink_get_family_id$nbd(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='cgroup]cgroupGPLposix_acl_access%@\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000380)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x26, {0x2, 0x4e24, @local}, 'irlan0\x00'}) 13:45:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f00000002c0), &(0x7f0000002600)=0x4) 13:45:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000004240)=[{{&(0x7f00000011c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup3(r1, r0, 0x0) 13:45:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getresuid(0x0, 0x0, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) 13:45:14 executing program 0: setitimer(0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) setitimer(0x1, 0x0, 0x0) 13:45:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x10000000000000fd, 0x2000000000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/if_inet6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:45:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f00000002c0), &(0x7f0000002600)=0x4) 13:45:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000240), 0xc, 0x0}, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000009c0)={0x3, &(0x7f0000000940)=[{}, {}, {}]}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000001000)={&(0x7f0000000900)=[0x40, 0x9, 0x4, 0x5f, 0x5, 0x20, 0x1000], 0x7, 0x5, 0x7, 0xdaa, 0x1f, 0x4, {0xb1, 0x82, 0x6, 0x8, 0x8, 0x3, 0x40, 0x0, 0x42, 0x7, 0x7, 0x0, 0x100000000, 0xfffffffffffff001, "0c2703cc287cb6320c1eaea639895e1fb013f1c27c392986ccaf0659cabc079e"}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 257.578620] syz-executor0 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 257.593381] print_req_error: 120 callbacks suppressed [ 257.593391] print_req_error: I/O error, dev loop3, sector 0 [ 257.598699] buffer_io_error: 120 callbacks suppressed [ 257.598709] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 257.617879] print_req_error: I/O error, dev loop3, sector 8 [ 257.623631] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 257.631773] print_req_error: I/O error, dev loop3, sector 16 [ 257.637773] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 257.645610] print_req_error: I/O error, dev loop3, sector 24 [ 257.651424] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 257.659250] print_req_error: I/O error, dev loop3, sector 32 [ 257.665151] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 257.672818] print_req_error: I/O error, dev loop3, sector 40 [ 257.679721] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 257.687571] print_req_error: I/O error, dev loop3, sector 48 [ 257.693410] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 257.701503] print_req_error: I/O error, dev loop3, sector 56 [ 257.707384] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 257.715101] print_req_error: I/O error, dev loop3, sector 64 [ 257.720921] Buffer I/O error on dev loop3, logical block 8, lost async page write 13:45:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000006c40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa0000004e2311b580fbf902bf4059f358dc1ab73301f0ffffc2eed78c43937a"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 13:45:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f00000002c0), &(0x7f0000002600)=0x4) [ 257.725929] print_req_error: I/O error, dev loop3, sector 72 [ 257.728711] Buffer I/O error on dev loop3, logical block 10, lost async page write 13:45:14 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x310) 13:45:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x10000000000000fd, 0x2000000000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/if_inet6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:45:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockname(r0, &(0x7f0000000040)=@l2, &(0x7f0000000100)=0x80) 13:45:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x4000, 0x0) unshare(0x8000400) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000002c0)) r1 = mq_open(&(0x7f0000000000)=' \x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r3, r2}}, 0x18) mq_notify(r1, &(0x7f0000000040)) 13:45:15 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ed000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000300)="440f20c0350d000000440f22c00f0926f20f1ba4b0441600000f06360f213666b82d008ee0b908080000b806000000ba000000000f30ea0c000000fa0066baf80cb81cb2378cef66bafc0cedc4c299ba0f", 0x51}], 0x1, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 258.487999] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 258.496472] FAT-fs (loop0): Filesystem has been set read-only [ 258.505364] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) [ 258.518585] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 258.528820] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 13:45:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getresuid(0x0, 0x0, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) 13:45:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x10000000000000fd, 0x2000000000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/if_inet6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 258.591947] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 258.627310] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) [ 258.662529] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 258.684406] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 13:45:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x4000, 0x0) unshare(0x8000400) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000002c0)) r1 = mq_open(&(0x7f0000000000)=' \x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r3, r2}}, 0x18) mq_notify(r1, &(0x7f0000000040)) 13:45:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000006c40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa0000004e2311b580fbf902bf4059f358dc1ab73301f0ffffc2eed78c43937a"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 13:45:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) getsockopt$packet_buf(r3, 0x111, 0x5, &(0x7f0000000400)=""/162, &(0x7f0000000040)=0xa2) 13:45:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') 13:45:16 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ed000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000300)="440f20c0350d000000440f22c00f0926f20f1ba4b0441600000f06360f213666b82d008ee0b908080000b806000000ba000000000f30ea0c000000fa0066baf80cb81cb2378cef66bafc0cedc4c299ba0f", 0x51}], 0x1, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 13:45:16 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ed000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000300)="440f20c0350d000000440f22c00f0926f20f1ba4b0441600000f06360f213666b82d008ee0b908080000b806000000ba000000000f30ea0c000000fa0066baf80cb81cb2378cef66bafc0cedc4c299ba0f", 0x51}], 0x1, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 13:45:16 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x4000, 0x0) unshare(0x8000400) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000002c0)) r1 = mq_open(&(0x7f0000000000)=' \x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r3, r2}}, 0x18) mq_notify(r1, &(0x7f0000000040)) [ 259.578181] input: syz1 as /devices/virtual/input/input5 [ 259.664981] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fsname=" 13:45:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x1, 0x264) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) [ 260.014548] input: syz1 as /devices/virtual/input/input6 13:45:16 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x4000, 0x0) unshare(0x8000400) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000002c0)) r1 = mq_open(&(0x7f0000000000)=' \x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r3, r2}}, 0x18) mq_notify(r1, &(0x7f0000000040)) 13:45:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000006c40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa0000004e2311b580fbf902bf4059f358dc1ab73301f0ffffc2eed78c43937a"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) [ 260.069814] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 13:45:17 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ed000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000300)="440f20c0350d000000440f22c00f0926f20f1ba4b0441600000f06360f213666b82d008ee0b908080000b806000000ba000000000f30ea0c000000fa0066baf80cb81cb2378cef66bafc0cedc4c299ba0f", 0x51}], 0x1, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 13:45:17 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ed000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000300)="440f20c0350d000000440f22c00f0926f20f1ba4b0441600000f06360f213666b82d008ee0b908080000b806000000ba000000000f30ea0c000000fa0066baf80cb81cb2378cef66bafc0cedc4c299ba0f", 0x51}], 0x1, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 13:45:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x1, 0x264) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) 13:45:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000002", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 13:45:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9602b6b3c582d1bc17c654ab2d867963e2117be6fdeb3a1efedaa97251b8dad48b314a0975391f158c0360e881aebf906819cca029bd1fb8891712e986bd8874c507128cead649506961622ded9b900a543324926f2eb475a8c2e436b617209a27796c0aadde6b07b9d04a06dcd5a0d533adbb43e2ca1f20d43fb14b96cb7a0f67e76332850df1eab9bf2fcb722438b780e8924b9d86d01ea08c56db3a63382c9d0814662615910eed701c60830a72d4b3ef42c6eaa12e11abd888df5591e2b7c23b4d658730789f2abacd1ed0b8f994b6ab49c6e4391f6f12d3c7728f51868fe06c39c20099b90df7074987939f91d780d712a71f90354b64f3e5bd250a40b7006f5e8ba91df94739daa34329564f4bc4219736fb1439028ab7bf070bb679c5b7c18c1d25da03803029148558b395ea76f3cc32d0d33690b0e3f1e69bf0f08ec930e8bc1f7b0904e6f5ea1408563db5321257b71806afd16cd18b6aa139e796c75f059158233a735b0fab04f4a0bd0ffb50ce50e38dec2d40c6898c23"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') 13:45:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x1, 0x264) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) [ 260.863768] ldm_validate_partition_table(): Disk read failed. [ 260.888786] Dev loop0: unable to read RDB block 0 [ 260.933219] loop0: unable to read partition table [ 260.946180] input: syz1 as /devices/virtual/input/input7 [ 261.016355] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 261.042237] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fsname=" 13:45:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000002", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 13:45:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000006c40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa0000004e2311b580fbf902bf4059f358dc1ab73301f0ffffc2eed78c43937a"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 13:45:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x1, 0x264) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) 13:45:18 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ed000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000300)="440f20c0350d000000440f22c00f0926f20f1ba4b0441600000f06360f213666b82d008ee0b908080000b806000000ba000000000f30ea0c000000fa0066baf80cb81cb2378cef66bafc0cedc4c299ba0f", 0x51}], 0x1, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 13:45:18 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ed000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000300)="440f20c0350d000000440f22c00f0926f20f1ba4b0441600000f06360f213666b82d008ee0b908080000b806000000ba000000000f30ea0c000000fa0066baf80cb81cb2378cef66bafc0cedc4c299ba0f", 0x51}], 0x1, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 13:45:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') [ 261.847284] input: syz1 as /devices/virtual/input/input8 13:45:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') [ 261.939389] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fsname=" [ 262.224297] input: syz1 as /devices/virtual/input/input9 [ 262.286190] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "fsname=" 13:45:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') 13:45:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9602b6b3c582d1bc17c654ab2d867963e2117be6fdeb3a1efedaa97251b8dad48b314a0975391f158c0360e881aebf906819cca029bd1fb8891712e986bd8874c507128cead649506961622ded9b900a543324926f2eb475a8c2e436b617209a27796c0aadde6b07b9d04a06dcd5a0d533adbb43e2ca1f20d43fb14b96cb7a0f67e76332850df1eab9bf2fcb722438b780e8924b9d86d01ea08c56db3a63382c9d0814662615910eed701c60830a72d4b3ef42c6eaa12e11abd888df5591e2b7c23b4d658730789f2abacd1ed0b8f994b6ab49c6e4391f6f12d3c7728f51868fe06c39c20099b90df7074987939f91d780d712a71f90354b64f3e5bd250a40b7006f5e8ba91df94739daa34329564f4bc4219736fb1439028ab7bf070bb679c5b7c18c1d25da03803029148558b395ea76f3cc32d0d33690b0e3f1e69bf0f08ec930e8bc1f7b0904e6f5ea1408563db5321257b71806afd16cd18b6aa139e796c75f059158233a735b0fab04f4a0bd0ffb50ce50e38dec2d40c6898c23"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') [ 262.534535] input: syz1 as /devices/virtual/input/input10 [ 262.572860] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "fsname=" 13:45:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r0) 13:45:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') [ 262.828311] input: syz1 as /devices/virtual/input/input11 [ 262.842811] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fsname=" 13:45:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040), 0x4000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000880)={0x3, 0x0, 0x9, 0x2, 0x7ff, 0x4, 0xfffffffffffffff9, 0x42, 0x0, 0x8}) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x56) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001200)=""/169, &(0x7f0000000200)=0xa9) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60}], 0x440, &(0x7f0000001180)={[{@nouser_xattr='nouser_xattr'}, {@tails_small='tails=small'}], [{@fsname={'fsname'}}]}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b80)='security.capability\x00', &(0x7f0000000a80)=@v3={0x3000000, [{0x0, 0x6a34}, {0x7f, 0x3730}], r5}, 0x18, 0x3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000012c0)=0xc, 0x4) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c9b], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty, [0x5a8, 0x3e8]}, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', "766574683100000000ffffffffffef00"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') [ 263.010195] input: syz1 as /devices/virtual/input/input12 [ 263.100739] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 263.216703] input: syz1 as /devices/virtual/input/input13 [ 263.290285] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "fsname=" [ 415.374962] INFO: task blkid:8024 blocked for more than 140 seconds. [ 415.381650] Not tainted 4.20.0-rc4+ #131 [ 415.386762] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 415.394743] blkid D21272 8024 7598 0x00000004 [ 415.400688] Call Trace: [ 415.403335] __schedule+0x8cf/0x21d0 [ 415.407543] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 415.412191] ? retint_kernel+0x2d/0x2d [ 415.416521] ? __sched_text_start+0x8/0x8 [ 415.420691] ? zap_class+0x640/0x640 [ 415.424411] ? lock_downgrade+0x900/0x900 [ 415.429916] ? check_preemption_disabled+0x48/0x280 [ 415.435332] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 415.440301] ? kasan_check_read+0x11/0x20 [ 415.444461] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 415.450233] ? find_held_lock+0x36/0x1c0 [ 415.454331] schedule+0xfe/0x460 [ 415.458094] ? __mutex_lock+0xafa/0x16f0 [ 415.462183] ? __schedule+0x21d0/0x21d0 [ 415.466638] ? kasan_check_read+0x11/0x20 [ 415.470804] ? do_raw_spin_unlock+0xa7/0x330 [ 415.475519] ? do_raw_spin_trylock+0x270/0x270 [ 415.480117] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 415.485425] ? mutex_destroy+0x200/0x200 [ 415.489517] schedule_preempt_disabled+0x13/0x20 [ 415.494278] __mutex_lock+0xaff/0x16f0 [ 415.498543] ? __blkdev_get+0x19b/0x13c0 [ 415.502646] ? mutex_trylock+0x2b0/0x2b0 [ 415.507043] ? find_held_lock+0x36/0x1c0 [ 415.511136] ? zap_class+0x640/0x640 [ 415.515267] ? zap_class+0x640/0x640 [ 415.518999] ? __lock_acquire+0x62f/0x4c20 [ 415.523249] ? find_held_lock+0x36/0x1c0 [ 415.527715] ? get_gendisk+0xd2/0x380 [ 415.531532] ? lock_downgrade+0x900/0x900 [ 415.536137] ? lock_release+0xa00/0xa00 [ 415.540167] ? perf_trace_sched_process_exec+0x860/0x860 [ 415.545948] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 415.550909] ? get_disk_and_module+0xf0/0xf0 [ 415.556811] ? kasan_check_write+0x14/0x20 [ 415.561079] ? up_read+0x225/0x2c0 [ 415.564640] ? down_read+0x8d/0x120 [ 415.568609] ? up_read_non_owner+0x100/0x100 [ 415.573051] ? __down_interruptible+0x700/0x700 [ 415.578036] ? blkdev_ioctl+0x21b0/0x21b0 [ 415.582207] mutex_lock_nested+0x16/0x20 [ 415.586583] ? mutex_lock_nested+0x16/0x20 [ 415.590848] __blkdev_get+0x19b/0x13c0 [ 415.595060] ? check_disk_change+0x140/0x140 [ 415.599513] blkdev_get+0xc1/0xb50 [ 415.603083] ? bdget+0x5b0/0x5b0 [ 415.606798] ? do_raw_spin_trylock+0x270/0x270 [ 415.611426] ? smack_sb_statfs+0x220/0x220 [ 415.616051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.621613] ? errseq_sample+0xe5/0x130 [ 415.625965] ? _copy_to_user+0x110/0x110 [ 415.630044] ? _raw_spin_unlock+0x2c/0x50 [ 415.634201] blkdev_open+0x1fb/0x280 [ 415.638281] do_dentry_open+0x499/0x1250 [ 415.642359] ? bd_acquire+0x2c0/0x2c0 [ 415.646538] ? chown_common+0x730/0x730 [ 415.650528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.656454] ? security_inode_permission+0xd2/0x100 [ 415.661533] ? inode_permission+0xb2/0x560 [ 415.666239] vfs_open+0xa0/0xd0 [ 415.669539] path_openat+0x12bc/0x5150 [ 415.673446] ? rcu_softirq_qs+0x20/0x20 [ 415.677822] ? unwind_dump+0x190/0x190 [ 415.681760] ? path_lookupat.isra.43+0xc00/0xc00 [ 415.687804] ? unwind_get_return_address+0x61/0xa0 [ 415.692751] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 415.698189] ? expand_files.part.8+0x571/0x9a0 [ 415.702793] ? find_held_lock+0x36/0x1c0 [ 415.707185] ? __alloc_fd+0x347/0x6e0 [ 415.711014] ? lock_downgrade+0x900/0x900 [ 415.715508] ? getname+0x19/0x20 [ 415.718898] ? kasan_check_read+0x11/0x20 [ 415.723049] ? do_raw_spin_unlock+0xa7/0x330 [ 415.727822] ? do_raw_spin_trylock+0x270/0x270 [ 415.732451] ? __lock_is_held+0xb5/0x140 [ 415.736844] ? __check_object_size+0xb1/0x782 [ 415.741365] ? _raw_spin_unlock+0x2c/0x50 [ 415.745939] ? __alloc_fd+0x347/0x6e0 [ 415.749767] do_filp_open+0x255/0x380 [ 415.753572] ? may_open_dev+0x100/0x100 [ 415.757953] ? get_unused_fd_flags+0x122/0x1a0 [ 415.762582] ? __alloc_fd+0x6e0/0x6e0 [ 415.766756] do_sys_open+0x568/0x700 [ 415.770493] ? filp_open+0x80/0x80 [ 415.774070] ? trace_hardirqs_off_caller+0x310/0x310 [ 415.779681] __x64_sys_open+0x7e/0xc0 [ 415.783508] do_syscall_64+0x1b9/0x820 [ 415.787732] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 415.793117] ? syscall_return_slowpath+0x5e0/0x5e0 [ 415.798369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.803226] ? trace_hardirqs_on_caller+0x310/0x310 [ 415.808558] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 415.813596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.820458] ? prepare_exit_to_usermode+0x291/0x3b0 [ 415.825826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.830695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.836211] RIP: 0033:0x7f09a2896120 [ 415.839943] Code: Bad RIP value. [ 415.843325] RSP: 002b:00007ffe988f0e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 415.851575] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f09a2896120 [ 415.859223] RDX: 00007ffe988f2f34 RSI: 0000000000000000 RDI: 00007ffe988f2f34 [ 415.866816] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 415.874094] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000220c030 [ 415.881698] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 415.889294] INFO: task syz-executor3:8026 blocked for more than 140 seconds. [ 415.896849] Not tainted 4.20.0-rc4+ #131 [ 415.901438] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 415.909699] syz-executor3 D23144 8026 6134 0x00000004 [ 415.916063] Call Trace: [ 415.918669] __schedule+0x8cf/0x21d0 [ 415.922398] ? __sched_text_start+0x8/0x8 [ 415.926897] ? kasan_check_read+0x11/0x20 [ 415.931069] ? mark_held_locks+0xc7/0x130 [ 415.935528] ? print_usage_bug+0xc0/0xc0 [ 415.939614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.944390] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 415.950412] ? retint_kernel+0x2d/0x2d [ 415.954318] ? trace_hardirqs_on_caller+0xc0/0x310 [ 415.959558] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.964354] schedule+0xfe/0x460 [ 415.968035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.972854] ? __schedule+0x21d0/0x21d0 [ 415.977176] ? retint_kernel+0x2d/0x2d [ 415.981106] ? _raw_spin_unlock_irq+0x56/0x80 [ 415.986081] rwsem_down_read_failed+0x371/0x710 [ 415.990774] ? rwsem_down_write_failed_killable+0x10/0x10 [ 415.996927] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 416.001708] ? retint_kernel+0x2d/0x2d [ 416.005997] ? lock_acquire+0x268/0x520 [ 416.009988] ? perf_trace_sched_process_exec+0x860/0x860 [ 416.015845] ? __get_super.part.11+0x107/0x2e0 [ 416.020449] call_rwsem_down_read_failed+0x18/0x30 [ 416.025745] down_read+0x9b/0x120 [ 416.029258] ? __get_super.part.11+0x207/0x2e0 [ 416.033862] ? __down_interruptible+0x700/0x700 [ 416.038882] __get_super.part.11+0x207/0x2e0 [ 416.043492] get_super+0x2d/0x50 [ 416.047190] fsync_bdev+0x17/0xc0 [ 416.050662] invalidate_partition+0x35/0x60 [ 416.055404] drop_partitions.isra.14+0xe1/0x200 [ 416.060105] ? delete_partition+0x2c0/0x2c0 [ 416.064457] ? retint_kernel+0x2d/0x2d [ 416.068757] rescan_partitions+0x72/0x8e0 [ 416.072937] __blkdev_reread_part+0x1ad/0x230 [ 416.078746] blkdev_reread_part+0x26/0x40 [ 416.082953] loop_reread_partitions+0x163/0x190 [ 416.087980] ? __loop_update_dio+0x6b0/0x6b0 [ 416.092408] loop_set_status+0xb95/0x1010 [ 416.096919] loop_set_status64+0xaa/0x100 [ 416.101079] ? loop_set_status_old+0x920/0x920 [ 416.106012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.111617] ? ns_capable_common+0x13f/0x170 [ 416.116368] lo_ioctl+0x90e/0x1d60 [ 416.119930] ? find_held_lock+0x36/0x1c0 [ 416.123995] ? lo_rw_aio+0x1ef0/0x1ef0 [ 416.128219] blkdev_ioctl+0x98e/0x21b0 [ 416.132156] ? blkpg_ioctl+0xc10/0xc10 [ 416.136444] ? lock_downgrade+0x900/0x900 [ 416.140627] ? check_preemption_disabled+0x48/0x280 [ 416.145971] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 416.150925] ? kasan_check_read+0x11/0x20 [ 416.155392] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 416.160684] ? rcu_softirq_qs+0x20/0x20 [ 416.164698] ? __fget+0x4d1/0x740 [ 416.168587] ? ksys_dup3+0x680/0x680 [ 416.172398] ? __might_fault+0x12b/0x1e0 [ 416.176858] ? lock_downgrade+0x900/0x900 [ 416.181025] block_ioctl+0xee/0x130 [ 416.184659] ? blkdev_fallocate+0x400/0x400 [ 416.189449] do_vfs_ioctl+0x1de/0x1790 [ 416.193359] ? ioctl_preallocate+0x300/0x300 [ 416.198139] ? memset+0x31/0x40 [ 416.201469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.208262] ? smack_file_ioctl+0x210/0x3c0 [ 416.212608] ? fget_raw+0x20/0x20 [ 416.216559] ? smack_file_lock+0x2e0/0x2e0 [ 416.220829] ? do_syscall_64+0x9a/0x820 [ 416.225155] ? do_syscall_64+0x9a/0x820 [ 416.229182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.234726] ? security_file_ioctl+0x94/0xc0 [ 416.239563] ksys_ioctl+0xa9/0xd0 [ 416.243047] __x64_sys_ioctl+0x73/0xb0 [ 416.247286] do_syscall_64+0x1b9/0x820 [ 416.251202] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 416.257020] ? syscall_return_slowpath+0x5e0/0x5e0 [ 416.261965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.267134] ? trace_hardirqs_on_caller+0x310/0x310 [ 416.272163] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 416.277524] ? prepare_exit_to_usermode+0x291/0x3b0 [ 416.282564] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.287844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.293043] RIP: 0033:0x457569 [ 416.296567] Code: Bad RIP value. [ 416.299950] RSP: 002b:00007ff18e4a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 416.308058] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 416.315685] RDX: 0000000020000380 RSI: 0000000000004c04 RDI: 0000000000000004 [ 416.322969] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 416.330556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff18e4a86d4 [ 416.339086] R13: 00000000004c07a8 R14: 00000000004d1288 R15: 00000000ffffffff [ 416.346703] INFO: task syz-executor0:8028 blocked for more than 140 seconds. [ 416.353895] Not tainted 4.20.0-rc4+ #131 [ 416.358755] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 416.366996] syz-executor0 D22456 8028 6077 0x00000004 [ 416.372645] Call Trace: [ 416.375722] __schedule+0x8cf/0x21d0 [ 416.379457] ? lock_downgrade+0x900/0x900 [ 416.383617] ? check_preemption_disabled+0x48/0x280 [ 416.388980] ? __sched_text_start+0x8/0x8 [ 416.393143] ? rcu_softirq_qs+0x20/0x20 [ 416.397466] ? zap_class+0x640/0x640 [ 416.401195] ? zap_class+0x640/0x640 [ 416.405250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.410841] ? balance_dirty_pages_ratelimited+0x1f7/0x2370 [ 416.416981] ? find_held_lock+0x36/0x1c0 [ 416.421067] schedule+0xfe/0x460 [ 416.424452] ? __mutex_lock+0xafa/0x16f0 [ 416.428871] ? __schedule+0x21d0/0x21d0 [ 416.432868] ? kasan_check_read+0x11/0x20 [ 416.437444] ? do_raw_spin_unlock+0xa7/0x330 [ 416.441866] ? do_raw_spin_trylock+0x270/0x270 [ 416.446781] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 416.451291] ? mutex_destroy+0x200/0x200 [ 416.455769] schedule_preempt_disabled+0x13/0x20 [ 416.460542] __mutex_lock+0xaff/0x16f0 [ 416.464433] ? blkdev_put+0x34/0x540 [ 416.469400] ? mutex_trylock+0x2b0/0x2b0 [ 416.473482] ? __lock_acquire+0x62f/0x4c20 [ 416.478150] ? page_rmapping+0xd9/0x160 [ 416.482159] ? mark_held_locks+0x130/0x130 [ 416.487164] ? __might_fault+0x1e0/0x1e0 [ 416.491266] ? _raw_spin_unlock+0x2c/0x50 [ 416.495844] ? __handle_mm_fault+0xa57/0x5be0 [ 416.500389] ? finish_task_switch+0x1b4/0x910 [ 416.505209] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.510791] ? locks_remove_posix+0x47d/0x840 [ 416.515615] ? vfs_lock_file+0xe0/0xe0 [ 416.519524] ? __switch_to_asm+0x34/0x70 [ 416.523592] ? __switch_to_asm+0x34/0x70 [ 416.527998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.533567] ? fsnotify+0x50e/0xef0 [ 416.537574] ? __switch_to_asm+0x40/0x70 [ 416.541664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.547520] ? locks_remove_file+0x3c6/0x5c0 [ 416.551945] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 416.557839] ? ima_file_free+0x132/0x650 [ 416.561933] ? fsnotify_first_mark+0x350/0x350 [ 416.566850] ? blkdev_put+0x540/0x540 [ 416.570666] mutex_lock_nested+0x16/0x20 [ 416.574744] ? mutex_lock_nested+0x16/0x20 [ 416.579843] blkdev_put+0x34/0x540 [ 416.583395] ? blkdev_put+0x540/0x540 [ 416.587505] blkdev_close+0x8b/0xb0 [ 416.591151] __fput+0x385/0xa30 [ 416.594446] ? get_max_files+0x20/0x20 [ 416.599713] ? trace_hardirqs_on+0xbd/0x310 [ 416.604051] ? kasan_check_read+0x11/0x20 [ 416.608531] ? task_work_run+0x1af/0x2a0 [ 416.612618] ? trace_hardirqs_off_caller+0x310/0x310 [ 416.618060] ? filp_close+0x1cd/0x250 [ 416.621884] ____fput+0x15/0x20 [ 416.625479] task_work_run+0x1e8/0x2a0 [ 416.629387] ? task_work_cancel+0x240/0x240 [ 416.633717] ? copy_fd_bitmaps+0x210/0x210 [ 416.638280] ? do_syscall_64+0x9a/0x820 [ 416.642274] exit_to_usermode_loop+0x318/0x380 [ 416.647175] ? __bpf_trace_sys_exit+0x30/0x30 [ 416.651694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.657545] do_syscall_64+0x6be/0x820 [ 416.661450] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 416.667232] ? syscall_return_slowpath+0x5e0/0x5e0 [ 416.672178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.677375] ? trace_hardirqs_on_caller+0x310/0x310 [ 416.682412] ? prepare_exit_to_usermode+0x291/0x3b0 [ 416.687845] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.692714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.698214] RIP: 0033:0x411021 [ 416.701423] Code: 4c 89 f6 48 89 c7 48 89 ca 48 89 4c 24 10 4c 89 54 24 08 e8 b1 a3 ff ff 48 8b 4c 24 10 41 c6 04 0f 00 4c 8b 7c 24 28 4c 8b 54 <24> 08 45 0f b6 37 e9 db fc ff ff 0f 1f 40 00 41 80 f8 29 74 7f ba [ 416.720781] RSP: 002b:00007fff04d494e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 416.729751] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000411021 [ 416.737356] RDX: 0000000000000000 RSI: ffffffff87db6887 RDI: 0000000000000004 [ 416.744644] RBP: 0000000000000000 R08: ffffffff8139caaa R09: 000000007278b1a8 [ 416.752256] R10: 00007fff04d49410 R11: 0000000000000293 R12: 0000000000000000 [ 416.759853] R13: 0000000000000001 R14: 0000000000000015 R15: 0000000000000000 [ 416.767511] ? __virt_addr_valid+0x1a/0x230 [ 416.771855] ? schedule_timeout+0x1c7/0x260 [ 416.776488] [ 416.776488] Showing all locks held in the system: [ 416.782828] 1 lock held by khungtaskd/1021: [ 416.787497] #0: 00000000554b9cd3 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 416.796448] 1 lock held by rsyslogd/5948: [ 416.800612] #0: 000000005eac9830 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 416.809000] 2 locks held by getty/6038: [ 416.812981] #0: 000000008c90459f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 416.821616] #1: 00000000d0471c3f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 416.830882] 2 locks held by getty/6039: [ 416.835153] #0: 00000000f4d2bc38 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 416.843441] #1: 00000000a98fac40 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 416.852740] 2 locks held by getty/6040: [ 416.857968] #0: 00000000a5c2ba97 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 416.866567] #1: 00000000278cefef (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 416.875772] 2 locks held by getty/6041: [ 416.879778] #0: 00000000de9859da (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 416.888365] #1: 00000000f058bbd3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 416.897590] 2 locks held by getty/6042: [ 416.901588] #0: 00000000ebcb7d9c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 416.910662] #1: 0000000049046727 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 416.919853] 2 locks held by getty/6043: [ 416.923830] #0: 00000000a2f927cb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 416.932458] #1: 000000006c4daffc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 416.941659] 2 locks held by getty/6044: [ 416.946009] #0: 000000001ed85897 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 416.954271] #1: 00000000471ead70 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 416.963478] 1 lock held by blkid/8024: [ 416.967694] #0: 00000000306c3a1a (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 416.976259] 3 locks held by syz-executor3/8026: [ 416.980933] #0: 000000004b317ab1 (&lo->lo_ctl_mutex/1){+.+.}, at: lo_ioctl+0x8e/0x1d60 [ 416.990317] #1: 00000000306c3a1a (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1e/0x40 [ 416.999373] #2: 000000007183db48 (&type->s_umount_key#47){++++}, at: __get_super.part.11+0x207/0x2e0 [ 417.009072] 1 lock held by syz-executor0/8028: [ 417.013655] #0: 00000000306c3a1a (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x34/0x540 [ 417.021883] 1 lock held by syz-executor0/8031: [ 417.026784] [ 417.028423] ============================================= [ 417.028423] [ 417.035776] NMI backtrace for cpu 0 [ 417.039418] CPU: 0 PID: 1021 Comm: khungtaskd Not tainted 4.20.0-rc4+ #131 [ 417.046431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.055814] Call Trace: [ 417.058499] dump_stack+0x244/0x39d [ 417.062154] ? dump_stack_print_info.cold.1+0x20/0x20 [ 417.067350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.072912] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 417.077657] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 417.082860] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 417.088145] arch_trigger_cpumask_backtrace+0x14/0x20 [ 417.093344] watchdog+0xb51/0x1060 [ 417.096906] ? hungtask_pm_notify+0xb0/0xb0 [ 417.101241] ? __kthread_parkme+0xce/0x1a0 [ 417.105498] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 417.110615] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 417.115737] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 417.120329] ? trace_hardirqs_on+0xbd/0x310 [ 417.124656] ? kasan_check_read+0x11/0x20 [ 417.128814] ? __kthread_parkme+0xce/0x1a0 [ 417.133054] ? trace_hardirqs_off_caller+0x310/0x310 [ 417.138167] ? trace_hardirqs_off_caller+0x310/0x310 [ 417.143283] ? lockdep_init_map+0x9/0x10 [ 417.147355] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 417.152477] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.158021] ? __kthread_parkme+0xfb/0x1a0 [ 417.162298] ? hungtask_pm_notify+0xb0/0xb0 [ 417.166643] kthread+0x35a/0x440 [ 417.170014] ? kthread_stop+0x900/0x900 [ 417.173992] ret_from_fork+0x3a/0x50 [ 417.177825] Sending NMI from CPU 0 to CPUs 1: [ 417.184399] NMI backtrace for cpu 1 [ 417.184407] CPU: 1 PID: 8031 Comm: syz-executor0 Not tainted 4.20.0-rc4+ #131 [ 417.184421] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.901 msecs [ 417.184426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.184436] RIP: 0010:xas_descend+0x13e/0x510 [ 417.184448] Code: 48 c1 ea 03 80 3c 02 00 0f 85 4e 03 00 00 49 8d 47 80 4d 8b 36 48 ba 00 00 00 00 00 fc ff df 48 89 c1 48 c1 e9 03 80 3c 11 00 <0f> 85 50 03 00 00 48 c1 e8 03 4d 89 77 80 48 ba 00 00 00 00 00 fc [ 417.184452] RSP: 0018:ffff8881814f6840 EFLAGS: 00000246 [ 417.184461] RAX: ffff8881814f6880 RBX: ffff8881814f6a30 RCX: 1ffff1103029ed10 [ 417.184467] RDX: dffffc0000000000 RSI: ffffffff87d7fded RDI: ffff8881814f6a38 [ 417.184474] RBP: ffff8881814f6928 R08: ffff88817f6ea700 R09: ffffed103b5e5b67 [ 417.184480] R10: ffffed103b5e5b67 R11: ffff8881daf2db3b R12: 000000000000001a [ 417.184487] R13: ffff8881bf99e480 R14: 0000000000000000 R15: ffff8881814f6900 [ 417.184494] FS: 00007f9c6b694700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000 [ 417.184499] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 417.184506] CR2: ffffffffff600400 CR3: 00000001cbcaf000 CR4: 00000000001406e0 [ 417.184512] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 417.184519] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 417.184522] Call Trace: [ 417.184526] ? xa_destroy+0x4d0/0x4d0 [ 417.184531] ? check_preemption_disabled+0x48/0x280 [ 417.184537] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 417.184542] ? check_preemption_disabled+0x48/0x280 [ 417.184546] ? rcu_softirq_qs+0x20/0x20 [ 417.184550] xas_load+0x145/0x1e0 [ 417.184554] find_get_entry+0x3ca/0x1120 [ 417.184559] ? find_held_lock+0x36/0x1c0 [ 417.184564] ? mark_page_accessed+0xcaf/0x2040 [ 417.184568] ? filemap_map_pages+0x1a20/0x1a20 [ 417.184572] ? find_get_entry+0xa87/0x1120 [ 417.184576] ? lock_downgrade+0x900/0x900 [ 417.184581] ? check_preemption_disabled+0x48/0x280 [ 417.184586] ? kasan_check_read+0x11/0x20 [ 417.184590] ? rcu_softirq_qs+0x20/0x20 [ 417.184594] ? find_get_entry+0xaae/0x1120 [ 417.184609] ? filemap_map_pages+0x1a20/0x1a20 [ 417.184613] ? mark_held_locks+0xc7/0x130 [ 417.184618] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 417.184628] ? retint_kernel+0x2d/0x2d [ 417.184634] ? trace_hardirqs_on_caller+0xc0/0x310 [ 417.184639] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 417.184644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.184649] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 417.184654] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 417.184659] ? zap_class+0x640/0x640 [ 417.184663] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.184668] pagecache_get_page+0x12f/0xf00 [ 417.184673] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 417.184677] ? print_usage_bug+0xc0/0xc0 [ 417.184682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.184686] ? __might_sleep+0x95/0x190 [ 417.184691] ? pagecache_get_page+0x2d8/0xf00 [ 417.184695] ? mark_held_locks+0xc7/0x130 [ 417.184700] ? __find_get_block+0x2f7/0xf20 [ 417.184704] ? __find_get_block+0x2f7/0xf20 [ 417.184709] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 417.184714] ? trace_hardirqs_on+0xbd/0x310 [ 417.184718] ? __getblk_gfp+0x2b3/0xd50 [ 417.184723] ? trace_hardirqs_off_caller+0x310/0x310 [ 417.184728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.184733] ? check_preemption_disabled+0x48/0x280 [ 417.184743] __find_get_block+0x63a/0xf20 [ 417.184748] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 417.184753] ? try_to_free_buffers+0xc80/0xc80 [ 417.184758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 417.184762] ? unlock_page+0x2c2/0x4c0 [ 417.184767] ? wake_up_page_bit+0x6f0/0x6f0 [ 417.184772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.184777] ? init_page_buffers+0x433/0x570 [ 417.184782] ? __set_page_dirty_buffers+0x810/0x810 [ 417.184786] ? __getblk_gfp+0x2ea/0xd50 [ 417.184790] ? __getblk_gfp+0x2d2/0xd50 [ 417.184795] __getblk_gfp+0x2b3/0xd50 [ 417.184800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.184805] ? check_preemption_disabled+0x48/0x280 [ 417.184809] ? __find_get_block+0xf20/0xf20 [ 417.184814] ? __lock_is_held+0xb5/0x140 [ 417.184819] ? perf_trace_sched_process_exec+0x860/0x860 [ 417.184824] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 417.184829] ? kasan_check_write+0x14/0x20 [ 417.184832] ? __brelse+0x104/0x180 [ 417.184837] ? block_commit_write+0x30/0x30 [ 417.184841] __bread_gfp+0x2d/0x310 [ 417.184845] fat__get_entry+0x5a6/0xa40 [ 417.184849] ? copy_overflow+0x30/0x30 [ 417.184854] ? inode_sb_list_add+0x213/0x2f0 [ 417.184858] ? lock_downgrade+0x900/0x900 [ 417.184863] fat_get_short_entry+0x13c/0x2c0 [ 417.184867] fat_subdirs+0x142/0x290 [ 417.184871] ? fat_dir_ioctl+0x1b0/0x1b0 [ 417.184876] ? _raw_spin_unlock+0x2c/0x50 [ 417.184880] ? inode_sb_list_add+0x213/0x2f0 [ 417.184885] ? evict_inodes+0x610/0x610 [ 417.184889] ? no_open+0x10/0x10 [ 417.184893] ? _raw_spin_unlock+0x2c/0x50 [ 417.184898] fat_fill_super+0x2a9f/0x4310 [ 417.184902] ? fat_flush_inodes+0x1a0/0x1a0 [ 417.184907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.184912] ? vsnprintf+0x20d/0x1b60 [ 417.184916] ? pointer+0x900/0x900 [ 417.184920] ? snprintf+0xae/0xe0 [ 417.184923] ? vsprintf+0x40/0x40 [ 417.184928] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 417.184933] ? set_blocksize+0x2c1/0x340 [ 417.184937] vfat_fill_super+0x31/0x40 [ 417.184941] mount_bdev+0x30c/0x3e0 [ 417.184945] ? vfat_mount+0x40/0x40 [ 417.184949] vfat_mount+0x34/0x40 [ 417.184953] mount_fs+0xae/0x31d [ 417.184958] vfs_kern_mount.part.35+0xdc/0x4f0 [ 417.184962] ? may_umount+0xb0/0xb0 [ 417.184966] ? _raw_read_unlock+0x2c/0x50 [ 417.184970] ? __get_fs_type+0x97/0xc0 [ 417.184974] do_mount+0x581/0x31f0 [ 417.184979] ? check_preemption_disabled+0x48/0x280 [ 417.184984] ? copy_mount_string+0x40/0x40 [ 417.184988] ? copy_mount_options+0x5f/0x430 [ 417.184993] ? rcu_read_lock_sched_held+0x14f/0x180 [ 417.184998] ? kmem_cache_alloc_trace+0x353/0x750 [ 417.185004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.185009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.185013] ? copy_mount_options+0x315/0x430 [ 417.185018] ksys_mount+0x12d/0x140 [ 417.185022] __x64_sys_mount+0xbe/0x150 [ 417.185026] do_syscall_64+0x1b9/0x820 [ 417.185031] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 417.185036] ? syscall_return_slowpath+0x5e0/0x5e0 [ 417.185041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.185046] ? trace_hardirqs_on_caller+0x310/0x310 [ 417.185052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.185056] ? prepare_exit_to_usermode+0x291/0x3b0 [ 417.185061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.185067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.185070] RIP: 0033:0x459fda [ 417.185099] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 417.185103] RSP: 002b:00007f9c6b693a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 417.185114] RAX: ffffffffffffffda RBX: 00007f9c6b693b30 RCX: 0000000000459fda [ 417.185120] RDX: 00007f9c6b693ad0 RSI: 00000000200002c0 RDI: 00007f9c6b693af0 [ 417.185126] RBP: 00000000200002c0 R08: 00007f9c6b693b30 R09: 00007f9c6b693ad0 [ 417.185132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 417.185139] R13: 0000000000000000 R14: 00000000004d90a0 R15: 00000000ffffffff [ 417.191311] Kernel panic - not syncing: hung_task: blocked tasks [ 417.891350] CPU: 0 PID: 1021 Comm: khungtaskd Not tainted 4.20.0-rc4+ #131 [ 417.898366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.907715] Call Trace: [ 417.910314] dump_stack+0x244/0x39d [ 417.913949] ? dump_stack_print_info.cold.1+0x20/0x20 [ 417.919221] panic+0x2ad/0x55c [ 417.922434] ? add_taint.cold.5+0x16/0x16 [ 417.926613] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 417.932119] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 417.937572] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 417.943065] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 417.948565] watchdog+0xb62/0x1060 [ 417.952131] ? hungtask_pm_notify+0xb0/0xb0 [ 417.956475] ? __kthread_parkme+0xce/0x1a0 [ 417.960715] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 417.965824] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 417.970952] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 417.975568] ? trace_hardirqs_on+0xbd/0x310 [ 417.979901] ? kasan_check_read+0x11/0x20 [ 417.984056] ? __kthread_parkme+0xce/0x1a0 [ 417.988300] ? trace_hardirqs_off_caller+0x310/0x310 [ 417.993411] ? trace_hardirqs_off_caller+0x310/0x310 [ 417.998517] ? lockdep_init_map+0x9/0x10 [ 418.002587] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 418.008491] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 418.014034] ? __kthread_parkme+0xfb/0x1a0 [ 418.018282] ? hungtask_pm_notify+0xb0/0xb0 [ 418.022618] kthread+0x35a/0x440 [ 418.025998] ? kthread_stop+0x900/0x900 [ 418.029977] ret_from_fork+0x3a/0x50 [ 418.034866] Kernel Offset: disabled [ 418.038489] Rebooting in 86400 seconds..