SOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:27 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x6000000]}) 15:18:27 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x7000000]}) 15:18:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d775, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:28 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x8000000]}) 15:18:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d917, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 946.002955][T26969] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x600, 0x0, 0x0, 0x0}) [ 946.094257][T26969] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 946.116925][T26969] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:28 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x3f000000]}) [ 946.232641][T27038] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 946.417090][T27038] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 946.516092][T27038] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d776, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:28 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0xff000000]}) 15:18:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d918, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x700, 0x0, 0x0, 0x0}) 15:18:28 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:18:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 947.009801][T27148] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 947.126647][T27148] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 947.191761][T27148] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d919, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:29 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x2]}) 15:18:29 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x3]}) 15:18:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x752, 0x0, 0x0, 0x0}) [ 947.678807][T27270] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 947.711948][T27270] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 947.723332][T27270] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="9d000097b40000002167bcf4856a178a4e8a263526e5451680e06ef22c59fff96e418f1b304eaf458393bb6b96c5b00513a0e2ce2b9665b03b4ac98d391a89430479cd3b828518a6bab2386f9bfe0756f5510567fbcec524d9f1790ee5041c5838142282af4cb2df6cf448c3ae0261e84c3fde057baa4a235f2b4538b51964ca694b53d543f002c7bdc3706dc3a4fd649e0c5db5e96063743464febb60190985a76477439fcdf2a460cbe40bb6825bcd8fa01b8dc3bbdfb52814ca"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x8002, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) accept4$ax25(r3, 0x0, &(0x7f00000000c0), 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d777, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:29 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x4]}) 15:18:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d91a, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x1c00, 0x0, 0x0, 0x0}) 15:18:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x5]}) 15:18:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x6]}) [ 948.044734][T27328] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x1e00, 0x0, 0x0, 0x0}) [ 948.110195][T27328] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d778, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d91b, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 948.187769][T27328] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x7]}) [ 948.349089][T27285] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 948.379079][T27285] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 948.425522][T27285] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200022e26df6376010000000016d9eb8c0abf5acd6e21c07a54d6600d83a306a53650a68be90dbc96e3291d5940ea43e8f32bb776c0983573c04bd6bef2bfb0855ca4ddfbdfaf50823dbb67468f30203908000000c29289000000000000000000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 15:18:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x3f00, 0x0, 0x0, 0x0}) 15:18:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x8]}) 15:18:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d779, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d91c, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 948.609618][T27398] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:18:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x300]}) 15:18:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x500]}) 15:18:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x600]}) [ 948.867194][T27478] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 948.902954][T27478] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x700]}) [ 948.929972][T27478] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d91d, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x3f00]}) 15:18:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x14800, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x5000, 0x0, 0x0, 0x0}) 15:18:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d77a, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d91e, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0xff00]}) 15:18:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x1000000]}) [ 949.629000][T27623] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 949.653028][T27623] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x2000000]}) [ 949.707224][T27623] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d91f, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={0x0, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x5207, 0x0, 0x0, 0x0}) [ 949.856628][T27635] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x3000000]}) [ 949.922935][T27635] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 949.942447][T27635] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 950.032373][T27722] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 950.111991][T27722] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 950.180905][T27722] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 950.377516][T27635] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 950.434368][T27635] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 950.453711][T27635] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) sendfile(r5, 0xffffffffffffffff, 0x0, 0xd811) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f00000000c0)={0x1, 0x3, 0xff, 0x200, 0x3, 0x7ff}) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d77b, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x8002, 0x0, 0x0, 0x0}) 15:18:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d920, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x4000000]}) 15:18:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={0x0, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 950.768766][T27748] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x5000000]}) 15:18:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={0x0, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d77c, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d921, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 950.770811][T27748] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 950.770903][T27748] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 950.926249][T27833] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x6000000]}) [ 950.926759][T27833] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x7000000]}) 15:18:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x8000000]}) [ 950.926828][T27833] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 951.076366][T27833] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 951.076824][T27833] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 951.076896][T27833] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0xff00, 0x0, 0x0, 0x0}) 15:18:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="02000000000000cce09c873e84ad77b8211de14acd1973721b5fd5bbef2f671ad5aa204b91bafe5f7ba201002402e400000000000057d49fed4981deb89cd46af09f39b80cdd44789eca500ef4787efebd44d10ca5ef1271fc40fed7646be3c38ae27a5e61462eef5a1479a034e697ca89be09b1413aac8d29d39b4d92934553e08df06a91d9a477ff518937ea897c7ed28632e7b0bb360a1f1467693160ada5623e5c4c73c0ebaedb671471069c293684b407346e3e8ea80a0afd1c9e4ab82fe7d23bc58f1a"], 0x2000, 0x0) r0 = getpid() r1 = getpid() sched_setattr(r1, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r1, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, r3, r4, 0x0, 0x0, 0x11, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d922, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x3f000000]}) 15:18:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d77d, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0xff000000]}) [ 951.581505][T27935] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 951.675015][T27935] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:18:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d923, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d77e, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x1000000, 0x0, 0x0, 0x0}) [ 951.832221][T27935] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x2]}) 15:18:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d924, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000000000f7f2a14fca60203ab882002fc6700cea52d56923dd5bc8ab966a8655408613081f42715c6bb31b07953729811d09cc578f041d9a9a54044fd2c393d91bace88304cdbad9d91c6b6d2ae315b4c6ca153cfe82687ac02f62cfb5ac64c2225c06d5c318f52e47a7e65e80243c45206ac5cd6edeffb5e0e1c0ec72541c8709cd307ac6eb466a308c2be949b3aeff2ec14c643fc95dceb8f2cb252dbfe71f51c3a009e35430c4450d516ef41dd4c6f25f3d0991e88b1a4d807a"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x2000000, 0x0, 0x0, 0x0}) 15:18:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x3]}) 15:18:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x4]}) 15:18:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x5]}) 15:18:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d77f, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d925, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x3000000, 0x0, 0x0, 0x0}) 15:18:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x6]}) [ 952.667194][T28174] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 952.700110][T28174] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x7]}) [ 952.815442][T28174] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:35 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x8]}) [ 953.077536][T28169] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 953.133764][T28169] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 953.220758][T28169] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0, 0x0, 0x33d0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x40047) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x4000000, 0x0, 0x0, 0x0}) [ 953.389445][T28260] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:18:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d926, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d780, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:35 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x300]}) 15:18:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:35 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x500]}) 15:18:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d927, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 953.753413][T28292] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:36 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x600]}) [ 953.862385][T28292] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x5000000, 0x0, 0x0, 0x0}) 15:18:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d781, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 953.963152][T28292] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:36 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x700]}) [ 954.124985][T28381] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 954.137066][T28381] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 954.151201][T28381] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 954.249508][T28467] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 954.270973][T28467] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 954.297447][T28467] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d928, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:36 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x3f00]}) 15:18:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x6000000, 0x0, 0x0, 0x0}) 15:18:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d782, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x3, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0], 0x1}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff87, 0x0, 0x0, 0x0) 15:18:36 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0xff00]}) [ 954.606354][T28487] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 954.761923][T28487] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:37 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x1000000]}) 15:18:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d929, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x7000000, 0x0, 0x0, 0x0}) [ 954.905397][T28487] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d783, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:37 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x2000000]}) [ 955.067964][T28511] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 955.157574][T28511] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 955.157681][T28511] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:37 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x3000000]}) 15:18:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d784, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d92a, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 955.369214][T28511] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:18:37 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x4000000]}) 15:18:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x7520000, 0x0, 0x0, 0x0}) 15:18:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0xd, "feced378b7729d895e292261c6"}, &(0x7f00000001c0)=0x15) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d92b, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d785, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 955.755651][T28673] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 955.767777][T28673] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 955.782029][T28673] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x8000000, 0x0, 0x0, 0x0}) 15:18:38 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x5000000]}) [ 955.978032][T28731] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 956.037805][T28731] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 956.112561][T28731] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 956.389326][T28820] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 956.416347][T28820] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 956.455959][T28820] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d92c, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:38 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x6000000]}) 15:18:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0xd, "feced378b7729d895e292261c6"}, &(0x7f00000001c0)=0x15) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d786, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x10000000, 0x0, 0x0, 0x0}) 15:18:38 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x7000000]}) [ 956.852394][T28834] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 956.933874][T28834] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 956.991437][T28834] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x1c000000, 0x0, 0x0, 0x0}) 15:18:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2edaec7ee0dbe3180196877de534efd2289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c42768a00894d9b67ccbc15301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f4700"/326], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000540)={r4, 0x9a, "86dc6540a4de304204c0dbe1cc4db17a8d027fd1f7ac36f24e1cd87013ea18c1ae08fcc3eb1ff578f975191ade03114cd141dd9645bc33a8bfabed7e4802e4e67515c1a13a77dcf3b657e2bcc1cf54c9f3304fb2932b4b5cd24ee8657d517c3657c245efe2254e939eccb09686b3d3d88bcf805f39c77bb11bfe15b671f7f02c5629ba198584a6bde430331e5a5b09e96f3382bee48ce0b21a4d"}, &(0x7f00000000c0)=0xa2) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d787, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d92d, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x8000000]}) 15:18:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0xd, "feced378b7729d895e292261c6"}, &(0x7f00000001c0)=0x15) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 957.281968][T28930] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 957.360254][T28930] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 957.498187][T28930] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x3f000000]}) 15:18:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x1e000000, 0x0, 0x0, 0x0}) 15:18:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x14, "feced378b7729d895e292261c6e9136b8d0c8733"}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d788, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0xff000000]}) 15:18:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d92e, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x3f000000, 0x0, 0x0, 0x0}) [ 957.774869][T29017] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 957.851376][T29017] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 957.864401][T29017] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 957.995269][T29034] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) quotactl(0x3, &(0x7f00000000c0)='./file1\x00', r4, &(0x7f0000000540)="ee03bcce1dd98f54303cdc69d3f7181e0ea77fd69b6d011297601a7fd56f9edaa0855f0bd203e417365ac4318ef276d65d56de120c4b834e3c457020d7e404af9f28ab7f0f087b0f37e2eb8092729cccd88c5c9db44a88a52ebe29c7bb1559e10b2140c2cb7887c5b8558eda1d27a4d86103f13c9b0e2221935e40014a97646dc038ffd9800615f37d1659d6fb08b5774a393bf55d4deb82101b1270cab13a189203e422e0cf3689eb5b4bf0eef8afb4fc88cc19c44e7232a09878754801f10e79c902cce00780") mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) [ 958.143964][T29034] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x50000000, 0x0, 0x0, 0x0}) [ 958.208725][T29034] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d789, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x14, "feced378b7729d895e292261c6e9136b8d0c8733"}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x2]}) 15:18:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d92f, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x3]}) 15:18:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x80020000, 0x0, 0x0, 0x0}) 15:18:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x14, "feced378b7729d895e292261c6e9136b8d0c8733"}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d78a, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x4]}) [ 958.972634][T29217] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 958.973095][T29217] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 958.973145][T29217] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0xff000000, 0x0, 0x0, 0x0}) 15:18:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d930, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x5]}) 15:18:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d78b, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x17, "feced378b7729d895e292261c6e9136b8d0c8733708835"}, &(0x7f00000001c0)=0x1f) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) close(0xffffffffffffffff) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), 0xffffffffffffffff, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {r5, 0x10, 0x0, @ib={0x1b, 0x97, 0x4, {"fa9a37173017f369420f95fff520057c"}, 0x7, 0x3, 0x1f}}}, 0x90) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000440)='.\x00', 0x20000000000001, 0x0, 0x0, 0x800, 0x0) 15:18:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x6]}) 15:18:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 959.515105][T29299] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x7]}) 15:18:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x2, 0x0, 0x0}) 15:18:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d931, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 959.640914][T29299] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 959.657318][T29299] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x8]}) 15:18:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d78c, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x70, 0x0, 0x5, 0x652, 0x80}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d932, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x17, "feced378b7729d895e292261c6e9136b8d0c8733708835"}, &(0x7f00000001c0)=0x1f) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x300]}) 15:18:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x500]}) 15:18:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x340, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000001c0), &(0x7f0000000440)=0x4) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x3, 0x0, 0x0}) [ 960.045450][T29450] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 960.062128][T29450] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 960.078838][T29450] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x600]}) 15:18:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x700]}) 15:18:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x17, "feced378b7729d895e292261c6e9136b8d0c8733708835"}, &(0x7f00000001c0)=0x1f) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d78d, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 960.363051][T29502] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d933, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x3f00]}) [ 960.363570][T29502] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 960.363618][T29502] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 960.521956][T29552] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 960.522057][T29552] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 960.522072][T29552] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 960.596364][T29550] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r5, 0xc0045520, &(0x7f00000000c0)=0x8) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 960.596742][T29550] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 960.596829][T29550] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x19, "feced378b7729d895e292261c6e9136b8d0c8733708835f338"}, &(0x7f00000001c0)=0x21) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0xff00]}) 15:18:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d78e, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x1000000]}) 15:18:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x4, 0x0, 0x0}) 15:18:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 960.941141][T29636] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d934, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 961.024826][T29636] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d78f, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 961.143611][T29636] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x5, 0x0, 0x0}) 15:18:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x3000000]}) 15:18:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d935, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 961.741538][T29656] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 961.792259][T29656] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 961.860172][T29656] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x930b}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f00000001c0)={0x80000001, "30668429da1b8db0b99f653cddabc372bb2a560fbe64c89f01a3bad4c8ab5f9b", 0x3, 0x1}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"/326], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x84000, 0x0) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x400, 0x0) 15:18:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x6, 0x0, 0x0}) 15:18:44 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x4000000]}) 15:18:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d790, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x19, "feced378b7729d895e292261c6e9136b8d0c8733708835f338"}, &(0x7f00000001c0)=0x21) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d936, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 962.202104][T29842] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 962.214697][T29842] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x19, "feced378b7729d895e292261c6e9136b8d0c8733708835f338"}, &(0x7f00000001c0)=0x21) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:44 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x5000000]}) [ 962.214765][T29842] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x7, 0x0, 0x0}) 15:18:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d791, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:44 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x6000000]}) 15:18:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d937, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x8, 0x0, 0x0}) 15:18:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0215c000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020003009b05b8cabcd14ee20c22534e7fd465ae418b93a77ce1e41664022d41", @ANYRES32=0x0, @ANYBLOB="040001000000000008000100", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x64, 0x3) r3 = msgget$private(0x0, 0x586) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, r2, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x80000000000, 0x0, 0x0, 0x3, 0x2000, 0x8003, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x41, &(0x7f00000004c0)={0xa, 0x4e22, 0x101, @remote, 0x5}, 0x1c) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r5, 0x0, r4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 962.765881][T29966] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d792, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:44 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x7000000]}) [ 962.865991][T29966] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 962.961646][T29966] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d938, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x10, 0x0, 0x0}) 15:18:45 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x8000000]}) 15:18:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 963.204781][T29991] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 963.297062][T29991] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:45 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}) [ 963.339592][T29991] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x1c, 0x0, 0x0}) 15:18:45 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0xff000000]}) 15:18:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d793, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 963.550002][T30124] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 963.568148][T30124] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 963.581163][T30124] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d939, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 963.719114][T30032] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:18:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:45 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:18:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d794, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:46 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 15:18:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r3, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000440)={'bridge0\x00', {0x2, 0x4e24, @broadcast}}) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES64=r1, @ANYRES16, @ANYRESDEC], &(0x7f00000000c0)=0x8) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r5}, 0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r5, 0xfffffe01}, &(0x7f00000001c0)=0x8) [ 964.019709][T30169] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 964.130588][T30169] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d93a, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x1e, 0x0, 0x0}) 15:18:46 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 964.280942][T30169] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d93b, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x50, 0x0, 0x0}) 15:18:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d795, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r1}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r1, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000240)={r2, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 964.481294][T30233] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 964.563578][T30233] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:46 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) [ 964.630653][T30233] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:46 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 15:18:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d796, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 964.942248][T30272] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x280, 0x0, 0x0}) [ 964.983520][T30272] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 965.062755][T30272] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d93c, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:47 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 15:18:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x300, 0x0, 0x0}) 15:18:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 965.208049][T30347] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 965.289732][T30347] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 965.361538][T30347] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d797, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:47 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 15:18:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r1}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r1, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000240)={r2, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$VIDIOC_G_INPUT(r4, 0x80045626, &(0x7f00000000c0)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d93d, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:47 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 15:18:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x500, 0x0, 0x0}) 15:18:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d798, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r1}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r1, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000240)={r2, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d93e, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 966.144709][T30580] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:48 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}) 15:18:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x600, 0x0, 0x0}) [ 966.261372][T30580] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0215c000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020003009b05b8cabcd14ee20c22534e7fd465ae418b93a77ce1e41664022d41", @ANYRES32=0x0, @ANYBLOB="040001000000000008000100", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x64, 0x3) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x1, 0x3, 0x0) msgsnd(r3, &(0x7f0000000080)={0x2}, 0x8, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000540)={{0xffffffffffffffff, 0x0, r2, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x3ff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r5, 0x0, r4) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 966.426686][T30580] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d799, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:48 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 15:18:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 966.676403][T30632] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 966.699490][T30632] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:48 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}) 15:18:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d93f, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 966.699515][T30632] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x700, 0x0, 0x0}) 15:18:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d79a, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}) 15:18:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x752, 0x0, 0x0}) 15:18:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d940, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 967.373941][T30786] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 967.530839][T30786] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 967.580213][T30786] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x1}, 0x8, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}) 15:18:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d79b, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x1c00, 0x0, 0x0}) 15:18:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d941, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:50 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}) [ 968.054151][T30864] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 968.082057][T30864] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d79c, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d942, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={0x0, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 968.082120][T30864] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 968.145702][T30887] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:50 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 968.146013][T30887] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 968.146027][T30887] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:50 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 968.798001][T30887] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 968.903883][T30887] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 968.978882][T30887] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x1e00, 0x0, 0x0}) 15:18:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d79d, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d943, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:51 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}) 15:18:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0b040400"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = getpid() sched_setattr(r2, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) rt_tgsigqueueinfo(r2, r3, 0x25, &(0x7f0000000540)={0x15, 0x2, 0x10001}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r4, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={0x0, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:51 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 15:18:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x3f00, 0x0, 0x0}) 15:18:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d944, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d79e, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={0x0, 0x4, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:51 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) 15:18:52 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}) 15:18:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x5000, 0x0, 0x0}) 15:18:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d79f, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x0, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:52 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xd811) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000001c0)={0x9d0000, 0x2, 0x7, r0, 0x0, &(0x7f00000000c0)={0x980921, 0xe186, [], @ptr=0x80}}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f00000004c0)={r4, 0x2}) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r5}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r7, 0x0, r6) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:52 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}) 15:18:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d945, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x5207, 0x0, 0x0}) 15:18:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x0, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:52 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 15:18:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x1, 0x3, 0x0) msgsnd(r1, &(0x7f0000000080)={0x2}, 0x8, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440)='/dev/vcsu#\x00', 0x0, 0x80) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000004c0)={'veth0_to_hsr\x00', @broadcast}) msgctl$MSG_STAT(r1, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r4, 0x0, r3) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(r5, 0x113, 0x4, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:52 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}) 15:18:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x8002, 0x0, 0x0}) [ 970.686277][T31330] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d946, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x0, 0xb0, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0ff319e5a9fb"}, 0xb8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 970.794409][T31330] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a1, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 970.872900][T31330] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 15:18:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0xff00, 0x0, 0x0}) 15:18:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d947, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) [ 971.145582][T31398] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 971.213903][T31398] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 971.280480][T31398] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 971.469456][T31500] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 971.561533][T31500] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 971.588032][T31500] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000100000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000540)={'nat\x00', 0xa7, "d8a5654960104ab5f18ac1797b34e6b5d3711d9ec518a7ec5c7e98600d8d8d64bae5257bda9522ac2b3fcdc216527a3faace66a8ff93cf09d45f7de4cabcdd1bc7d44793b629ca0f5dbcc79ec691f71d6ae9cc97b96222abe55b82def2d697bc35def92f0cbc51cdc91370c579aedd2f0ea8f87c777d7570e768f63630c0daa59365232405e01b3fe26b01202cd7158ca6d3668fe3b0983c4ae591284d366fca45b64c52f4e575"}, &(0x7f00000000c0)=0xcb) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x406, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a2, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x1000000, 0x0, 0x0}) 15:18:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4}, 0x8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d948, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 15:18:54 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 15:18:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4}, 0x8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:54 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 15:18:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a3, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000540)=""/94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x2000000, 0x0, 0x0}) 15:18:54 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 15:18:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d949, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4}, 0x8) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x3000000, 0x0, 0x0}) 15:18:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d94a, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 972.612526][T31785] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 972.636310][T31785] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:18:54 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 972.663393][T31785] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:54 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 15:18:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x58, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb44"}, 0x60) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) connect(0xffffffffffffffff, &(0x7f0000000540)=@l2tp6={0xa, 0x0, 0x73a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x80) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d94b, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:55 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}) 15:18:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x4000000, 0x0, 0x0}) 15:18:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a5, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 973.138763][T31886] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 973.178656][T31886] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 973.220018][T31886] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$DRM_IOCTL_MODE_GET_LEASE(r4, 0xc01064c8, &(0x7f00000001c0)={0x3, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0]}) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="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"/465], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:55 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 15:18:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x58, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb44"}, 0x60) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d94c, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x5000000, 0x0, 0x0}) 15:18:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a6, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:55 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}) 15:18:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x58, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb44"}, 0x60) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d94d, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x6000000, 0x0, 0x0}) 15:18:56 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}) 15:18:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a7, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x84, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43"}, 0x8c) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$PPPIOCDISCONN(r4, 0x7439) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d94e, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a8, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:56 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}) 15:18:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x7000000, 0x0, 0x0}) 15:18:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x84, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43"}, 0x8c) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d94f, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:57 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}) [ 975.072655][T32230] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 975.093266][T32230] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 975.127065][T32230] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x84, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43"}, 0x8c) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x7520000, 0x0, 0x0}) 15:18:57 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 15:18:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7a9, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 975.590560][T32227] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 975.681580][T32227] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 975.720182][T32227] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:57 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 15:18:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d950, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x8000000, 0x0, 0x0}) 15:18:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x9a, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff"}, 0xa2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7aa, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x10000000, 0x0, 0x0}) [ 976.004771][T32389] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:18:58 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}) [ 976.066055][T32389] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 976.077721][T32389] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x9a, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff"}, 0xa2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ab, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200050000000000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, r2}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x8003, 0x0, 0x4, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r4, 0x0, r3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d951, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:58 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 15:18:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x1c000000, 0x0, 0x0}) 15:18:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0x9a, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff"}, 0xa2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x1e000000, 0x0, 0x0}) 15:18:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ac, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:58 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) 15:18:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x20000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 976.991001][T32570] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 977.030948][T32570] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 977.125625][T32570] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:18:59 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}) 15:18:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x3f000000, 0x0, 0x0}) 15:18:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ad, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:18:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="10efc36ce4"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000580)="bd154da1f06fd0ff6d02459ce7d52e4f3677ebc70091d52d87e6911eacf39d15a2225b2f55fee7bd1c2c94f4bf80381b38bd09560923be1b6c6af75825104beb3310e4f85585b0647543ed2b092328866b0a7f40b510ef3d672beeba59635e2b66445137fbda1321bde10b500f3d93a8f7dc6b4d1abd743ae3d919668a9e9a6d4af59646951f6ba82ce77df3ed70ae4b288cd9c383860112560aed2468a88de435a0e4abb1880b26fffa83b8fa03c2eb51ba9ff57ccc6cfb7ff65a5d18ee1c130fbb8e984a4a33f8fd64c527a7ea7c6a818e0bfa4a2a40699d") msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000004c0)={&(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000540)={r4, 0x5, 0x3f, 0x7, 0x64c, 0x10001, 0x101, 0xffff, 0x2, 0x11c, 0xfffffffb, 0x9}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r5, 0x0, r0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa5, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf"}, 0xad) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:18:59 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}) 15:18:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x50000000, 0x0, 0x0}) 15:18:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xf0ffff, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:18:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r4 = getpid() sched_setattr(r4, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) rt_tgsigqueueinfo(r3, r4, 0xe, &(0x7f0000000540)={0xf, 0x40, 0x17}) 15:19:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ae, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa5, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf"}, 0xad) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:00 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 15:19:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x80020000, 0x0, 0x0}) 15:19:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7af, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:00 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}) 15:19:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) read$eventfd(r5, &(0x7f00000000c0), 0x8) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa5, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf"}, 0xad) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0xff000000, 0x0, 0x0}) 15:19:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:00 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) [ 978.682885][ T398] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 978.750573][ T398] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 978.763130][ T398] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 978.849070][ T405] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 978.933847][ T405] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:01 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 979.116550][ T405] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b1, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:01 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 15:19:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 979.448081][ T538] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 979.499664][ T538] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 979.513333][ T538] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000000000ed20c81eee9acba1fddedd295149fb1ef89cb126256b7d6893bda7c442a5a6482d38666068096f4b34df67e14dea235f9d1ff8725ce33d2a9454e3e59bbf0c220b9d91347820155ccbd2dfaef0e89ff21d6eb0bb3bdeda0d11b6d8e0669558422d4aaaedf90138485e7912100763a6225bc6b7081bc8f78a368554a1f447ca59f5145aba584ca924c565449d22145d41595c80d9bfbe5001e3ae2183415f85b17d98c67c66b43ee5aab7de4067c429ac237a3751790233c8c5f5228eb83e7104dd8cb0d43ef51b549ada6befe93be680f540f8ac838689c0f035de22c43b43d1e1751b92045f5ef8f4a500c7"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) fcntl$setflags(r2, 0x2, 0x1) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r3, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c02652080000000000000400000000000000ba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd068a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='romfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:01 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 15:19:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2, 0x0}) 15:19:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:01 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 15:19:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b2, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 979.733863][ T584] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 979.874185][ T584] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 979.992498][ T584] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:02 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 15:19:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x3, 0x0}) 15:19:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa6, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0c"}, 0xae) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) getsockopt$IPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x43, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:02 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 15:19:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b3, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0}) [ 980.610014][ T768] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 980.652290][ T768] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:02 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x40, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400, 0xb08}, 0x0, 0x5, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=r0, @ANYBLOB="352865a94db5ee608626ba6e258b490fcdaa20aef420590c64c8f6ba2c291e7bd9006e809a08513d9ca4851d8aa059d6dbf48da19699f8083c21e4200e854b3d4532e3a0af39ea3ca7ea8d92fb82c887fa15e3aed57ff3614990f2219bf003ec219587e8a283341abfefb1ca4ca5891eb4ac6818c45f296c0b1e2c39979021ce2d5a36a6b5b46b511cc2e96050021be1768a7dece66d312e84368b4d4b", @ANYBLOB="73e16ca466a0ebbee04d8e7452f032786a5ef14fccc38efb24e9801aca5c7c73e6eb90"], 0x2000, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r1}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f00000001c0)=0x1, 0x4) fcntl$dupfd(r3, 0x0, r2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:03 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 980.863923][ T768] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0}) 15:19:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:03 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 15:19:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa6, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0c"}, 0xae) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 981.099900][ T835] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 981.138491][ T835] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 981.304902][ T835] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:03 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}) 15:19:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x6, 0x0}) 15:19:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x4000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 981.514346][ T873] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0215c000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020003009b05b8cabcd14ee20c22534e7fd465ae418b93a77ce1e41664022d41", @ANYRES32=0x0, @ANYBLOB="040001000000000008000100", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x64, 0x3) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, r2, 0x11, 0x2}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r4, 0x0, r3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 981.574980][ T873] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:03 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) [ 981.654659][ T873] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0}) 15:19:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b5, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x4d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:04 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}) 15:19:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa6, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0c"}, 0xae) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 981.909372][ T1002] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 981.945535][ T1002] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 981.945603][ T1002] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 982.090958][ T1002] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 982.115969][ T1002] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:04 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}) [ 982.135132][ T1002] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa9, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc"}, 0xb1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:04 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}) 15:19:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sysvipc/msg\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f00000000c0)={0xe002, 0x1, 0x7fff, 0xbad7}) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r4}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(0xffffffffffffffff, 0xc0884113, &(0x7f00000004c0)={0x0, 0xff, 0x80000001, 0x75f, 0xffff, 0xbe05, 0x4, 0x7f, 0x9, 0x60, 0x10000, 0x4}) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) 15:19:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b6, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x8, 0x0}) [ 982.395000][ T1108] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 982.417957][ T1108] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 982.443626][ T1108] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x5000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:04 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}) 15:19:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa9, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc"}, 0xb1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 982.736833][ T1116] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 982.737403][ T1116] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 982.737483][ T1116] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000080)=@req3={0x57, 0x0, 0x3}, 0x1c) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x24, r4, 0xc15, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x7f}}}, 0x24}}, 0x0) 15:19:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x10, 0x0}) [ 982.893188][ T1186] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 982.919698][ T1186] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 982.947632][ T1186] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b7, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:05 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 15:19:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa9, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc"}, 0xb1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x5d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1c, 0x0}) [ 983.284499][ T1221] IPVS: ftp: loaded support on port[0] = 21 15:19:05 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 15:19:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b8, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:06 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}) 15:19:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x6000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xaa, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d"}, 0xb2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 984.271272][ T1341] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 984.377026][ T1341] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 984.479837][ T1229] tipc: Started in network mode [ 984.485324][ T1229] tipc: Own node identity 7f, cluster identity 4711 [ 984.498120][ T1341] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 984.516638][ T1229] tipc: 32-bit node address hash set to 7f [ 984.610802][ T1432] IPVS: ftp: loaded support on port[0] = 21 [ 984.678483][ T8144] tipc: TX() has been purged, node left! 15:19:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:09 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 15:19:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1e, 0x0}) 15:19:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x6d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7b9, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xaa, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d"}, 0xb2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:09 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) [ 987.105690][ T1495] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 987.132864][ T1495] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x7000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:09 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}) [ 987.241803][ T1495] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 987.319564][ T1531] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 987.336422][ T1531] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 987.348422][ T1531] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x50, 0x0}) 15:19:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xaa, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d"}, 0xb2) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ba, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 987.495648][ T1531] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 987.552448][ T1531] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 987.590330][ T1531] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYRES16=0x0], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='jfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x7d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:09 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}) 15:19:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x280, 0x0}) 15:19:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7bb, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 987.763139][ T1645] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 987.822785][ T1645] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) ioctl$sock_inet_SIOCDELRT(r6, 0x890c, &(0x7f0000000540)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e23, @rand_addr=0x64010102}, {0x2, 0x4e21, @local}, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)='vcan0\x00', 0xfffffffffffff801, 0xad2, 0x3}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 987.879034][ T1645] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:10 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 15:19:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x8000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$NFT_MSG_GETOBJ_RESET(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x7c, 0x15, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 988.131524][ T1758] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:10 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}) [ 988.131579][ T1758] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x300, 0x0}) [ 988.131591][ T1758] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7bc, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x8d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:10 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 15:19:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x72, 0x0, 0x0, 0x7f, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x800, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x7704, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r3, 0x80045505, &(0x7f00000001c0)) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 988.656734][ T1852] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x500, 0x0}) [ 988.696921][ T1852] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 988.778393][ T1852] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:10 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) [ 988.935211][ T1897] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 988.962899][ T1897] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7bd, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x600, 0x0}) [ 989.136299][ T1897] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:11 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 15:19:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x9000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 989.378571][ T2006] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 989.475386][ T2006] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x700, 0x0}) 15:19:11 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 989.525694][ T2006] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7be, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x9d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 989.781751][ T2019] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 15:19:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYBLOB="ba710100025c2b0008000000000000003044a568148ea76cde91b81ec2e158a8"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40c20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x3ec, r2, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_MESH_ID={0x6f, 0x18, "174e6bb30d5d46a0d66a060fa800148445986f6c85c58d3217fa3ff1f69a30bf4866b6518a6c6a05f0804ab7281d1725c1a32e3b3493a97c352cbcf19f5ce7d582f79f2d27399ed5a861d3a934332da3c0d2bda5dc94ade5211440ad738e9b7f2d10cafd869d388d37dcfd"}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x8000}]}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x400}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_TX_RATES={0x250, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x28, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x1b, 0x2, "35b0aba43f8e8e87fef7223dfece31535185b4d0a26195"}]}, @NL80211_BAND_2GHZ={0x18, 0x0, [@NL80211_TXRATE_LEGACY={0x14, 0x1, "c8de13b0b81b9c8634d29f432af31c6f"}]}, @NL80211_BAND_5GHZ={0x4}, @NL80211_BAND_6GHZ={0x4c, 0x3, [@NL80211_TXRATE_HT={0x3d, 0x2, "283e097eb5bb334351b10ee31bd3fc6b8aa8b7de79882fa7aa027aa29d4286c53190cc0a335e51f16d63848cbc97d0f0c56671c05584cb535f"}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x58, 0x2, [@NL80211_TXRATE_HT={0x3d, 0x2, "66d11352aecd9653d320b8d28df39314a0093f365075511bd881509c179240dc8a18018aa3d766fd82fd51a6ce8591143f3dc9bb11282219fd"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x98a5, 0x7fff, 0x1, 0x5, 0x3ff, 0x3, 0x0, 0x20]}}]}, @NL80211_BAND_60GHZ={0x3c, 0x2, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x20, 0x8, 0xff, 0x9, 0x8, 0x1f, 0x1]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x9, 0x2, "83eb5db8a8"}]}, @NL80211_BAND_5GHZ={0x4c, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x10, 0x2, "65c0c9c169ae5a24b0afd950"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1000, 0x0, 0x80, 0x40, 0x0, 0x6, 0x40, 0x31c6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x6, 0x4, 0x6, 0xfac, 0x40, 0xb7f6, 0x5]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_2GHZ={0x74, 0x0, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x800, 0x2b2a, 0x100, 0x1, 0x7fff, 0x2]}}, @NL80211_TXRATE_HT={0x3c, 0x2, "e08840778aa51eeb86d53811610a6117607dc467cccf957e74ed88feb4f8c99b989bd250cf10100164987ac7e2a3664c05de2dc1f7bdaf5f"}, @NL80211_TXRATE_LEGACY={0x20, 0x1, "b4b6716ff7cf4946f0d3be8b399368541e90d1a8c88fa18bbd017a0d"}]}, @NL80211_BAND_2GHZ={0x68, 0x0, [@NL80211_TXRATE_HT={0x17, 0x2, "7b566a3f905a502238794872c60acd175949d9"}, @NL80211_TXRATE_LEGACY={0x10, 0x1, "0b47a5642796b3a7d2fe6569"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6a3c, 0x7, 0x2, 0x1, 0xdb2, 0x5, 0x6, 0x8ca]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x956f, 0xffc1, 0x6, 0xf4, 0x9, 0x4, 0x1, 0x3d2]}}, @NL80211_TXRATE_HT={0x12, 0x2, "1058f34685041cb4ba1746f2c4eb"}]}]}, @NL80211_ATTR_MESH_ID={0x95, 0x18, "35f1b0639187785bb2a1ba514c8a25bfe55a4cf80582f7a033137bc6bc4572a49524d1c1fc3f6a80cd0595f3a4001daa70e5ea523ea655cfec70d8eb93957c47e0ed4ea1871f51ed181b220ffd713c9906fa7d6da116489d368d5373a16e431be4fe19b6ff792eb2924e7151f8ce10a2c292ee311dfd198fe386ef242cdb7b0bf918f1c5a72ed929369230b70de35fb36c"}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x7cbf8e6}, @NL80211_ATTR_MESH_ID={0x56, 0x18, "305227c446bbc295121fc387270cdb85ffd017b2799f37ae988d18b0dd590469d5929dad66858bc05bee20abc0756d0c8927b63ada17c314436f7f4b5d6b9712a9a387c16132cc906a5666058192a5056467"}, @NL80211_ATTR_HANDLE_DFS={0x4}]}, 0x3ec}, 0x1, 0x0, 0x0, 0x4044000}, 0x40000) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r5, 0x0, r4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 989.880730][ T2019] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 989.880754][ T2019] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 990.393310][ T2156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=2156 comm=syz-executor.0 15:19:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x752, 0x0}) 15:19:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7bf, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xa000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11, 0x1000}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)={0x24, r4, 0x201, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r4, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40c1}, 0x24000010) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 990.780815][ T2204] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 990.849555][ T2204] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 990.962841][ T2204] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:13 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 15:19:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x54800, 0x0) ioctl$FBIOGETCMAP(r3, 0x4604, &(0x7f0000000580)={0x9, 0x1, &(0x7f00000001c0)=[0x0], &(0x7f0000000440)=[0x0], &(0x7f00000004c0)=[0x0], &(0x7f0000000540)=[0x0]}) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1c00, 0x0}) [ 991.281112][ T2298] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xad90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 991.321741][ T2298] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 991.442266][ T2298] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:13 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 15:19:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c1, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:13 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}) 15:19:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1e00, 0x0}) [ 991.846907][ T2378] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:19:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xbd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x418000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@initdev, @rand_addr, 0x0}, &(0x7f0000000540)=0xc) bind$packet(r1, &(0x7f0000000580)={0x11, 0x19, r2, 0x1, 0x20, 0x6, @remote}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r4, 0x0, r3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x401, 0x402) openat$cgroup_subtree(r5, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:14 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 15:19:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x3f00, 0x0}) 15:19:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c2, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:14 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}) [ 992.420940][ T2482] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xc000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 992.421826][ T2482] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:14 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}) [ 992.421898][ T2482] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x5000, 0x0}) 15:19:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c3, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xcd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 993.101186][ T2482] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 993.233134][ T2482] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 993.340680][ T2482] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="f8364fd208720d69240200000000000000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x5207, 0x0}) 15:19:15 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}) 15:19:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xdd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:15 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}) [ 993.794621][ T2753] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 993.817388][ T2753] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 993.849389][ T2753] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x8002, 0x0}) 15:19:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xe000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 994.018038][ T2788] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:16 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 994.104622][ T2788] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 994.120907][ T2788] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xed90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0xfd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1100, 0x4}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setregset(0x4205, r4, 0x200, &(0x7f0000000440)={&(0x7f00000001c0)}) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c5, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:16 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 15:19:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0xff00, 0x0}) 15:19:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x10000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:16 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}) 15:19:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x4}]}}]}, 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'team0\x00', r0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001140)={@loopback, @local, @dev={0xfe, 0x80, [], 0x12}, 0x3, 0x3, 0x9, 0x500, 0x3, 0x500000, r1}) r2 = getpid() sched_setattr(r2, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r2}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x2, 0x0) sendmsg$OSF_MSG_REMOVE(r3, &(0x7f00000004c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000440)={&(0x7f0000000540)={0xbb8, 0x1, 0x5, 0x301, 0x0, 0x0, {0xc, 0x0, 0x8}, [{{0x254, 0x1, {{0x3, 0x1}, 0xff, 0x5, 0x0, 0x3, 0x1a, 'syz0\x00', "e12427230684da9f36719b89035ff3527d07fce3471e5ba3b44437f225406bae", "b1c8d2d2ac15c26a09e874e9f81e06300c12fa018889936aa914ee04e4a43cc9", [{0x5, 0x0, {0x2, 0x3}}, {0x4d97, 0x400, {0x3, 0x9}}, {0x4, 0xd3, {0x3, 0x4}}, {0x1, 0xfe6d, {0x3, 0x7}}, {0xfff7, 0xaac, {0x3, 0x1}}, {0x101, 0xfffe, {0x1, 0x7}}, {0x5, 0x8001, {0x2, 0x80000001}}, {0x33f0, 0x0, {0x2, 0x9}}, {0x1, 0x100, {0x3, 0x400}}, {0xf000, 0x4, {0x3, 0x3}}, {0x400, 0x3, {0x0, 0x9c44}}, {0x3f, 0x0, {0x1, 0x7}}, {0x8, 0x7f, {0x0, 0x8000}}, {0x200, 0x2, {0x3}}, {0x1, 0x40, {0x3, 0x8}}, {0x3ff, 0x2, {0x3, 0x5}}, {0x4, 0x253, {0x5}}, {0x2, 0x70, {0x0, 0x7ff}}, {0x5, 0x1, {0x3, 0x10001}}, {0x8, 0x6, {0x0, 0x6c30}}, {0x6, 0xe5f}, {0x7f, 0x8d14, {0x0, 0x36}}, {0x80, 0x0, {0x0, 0x20}}, {0x2, 0xfffd, {0x1, 0x9}}, {0x2, 0xf6c8, {0x3, 0xffffffff}}, {0x6, 0x7f, {0x2, 0x1}}, {0x100, 0x99, {0x2, 0x7}}, {0x1, 0x7, {0x3, 0x2}}, {0x8, 0xfff, {0x3, 0x1}}, {0x7, 0x9, {0x1}}, {0x3f, 0x3, {0x0, 0x7}}, {0x56, 0x3f, {0x3, 0x8}}, {0x5d51, 0x4, {0x0, 0x3}}, {0x400, 0x8, {0x2, 0x7}}, {0x1, 0x8000, {0x2, 0xa2}}, {0x7, 0x3, {0x0, 0x4}}, {0x0, 0x101, {0xe8f83c3ca1936ad7, 0x8001}}, {0x5, 0x1, {0x0, 0x7}}, {0xfff, 0x2, {0x2, 0x2}}, {0xfff, 0x0, {0x2, 0x200}}]}}}, {{0x254, 0x1, {{0x1, 0x6}, 0x7f, 0x0, 0xcd9, 0x7fff, 0x24, 'syz1\x00', "c08071d855b0d8129157647d7b29ee3b6fd0dadca444cbb6d2f0c6fc957a392e", "fc62dfd616fd05a0469cef03f3eb38c8a46ada22d86203074be87a0c20456f16", [{0x75, 0x460, {0x3, 0x1145a1ca}}, {0xffff, 0x20, {0x2, 0x7}}, {0x400, 0x2, {0x1, 0x2}}, {0x0, 0x1ff, {0x0, 0xfffffffb}}, {0x80, 0x3, {0x1, 0xffff}}, {0x5, 0x9, {0x0, 0x7fff}}, {0x800, 0x2, {0x2, 0x8001}}, {0x5, 0x3f, {0x2, 0x7}}, {0x7, 0x5}, {0x3, 0x1, {0x0, 0x8}}, {0x8, 0xf9, {0x0, 0x101}}, {0x2, 0xc814, {0x3, 0x4}}, {0x1, 0x8, {0x2, 0x400}}, {0x9, 0x401, {0x3, 0x5}}, {0x80, 0x61, {0x2, 0x6}}, {0x1ff, 0x48, {0x1, 0xce7}}, {0x930, 0x0, {0x1, 0x5}}, {0x7ff, 0x4, {0x1, 0x100}}, {0x7f, 0x4, {0x2, 0xffff8000}}, {0x0, 0x8001, {0x0, 0x3}}, {0x3, 0x0, {0x1, 0x7fffffff}}, {0x2, 0xd4, {0x3, 0x4}}, {0x200, 0x3, {0x2, 0x7}}, {0x100, 0x3, {0x2, 0x2c2}}, {0x5, 0xce55, {0x0, 0xce4}}, {0x3, 0x6, {0x3, 0x3}}, {0x5, 0x1, {0x1, 0x9}}, {0x6, 0x100, {0x2}}, {0x4, 0x3, {0x1, 0xe9c}}, {0x7, 0x86, {0x1, 0x9}}, {0x9, 0x1, {0x3, 0x28b}}, {0x9, 0xe000, {0x0, 0x5}}, {0x4, 0x8001, {0x0, 0x7fffffff}}, {0xd4, 0x4c, {0x1, 0x8}}, {0xbd6, 0x1, {0x1, 0x800}}, {0x9, 0x3, {0x1, 0x9}}, {0x94b5, 0xc7eb, {0x1, 0x7}}, {0x8, 0x1, {0x1, 0x80}}, {0xeb, 0x0, {0x3, 0x2}}, {0x31, 0x20, {0x0, 0x7}}]}}}, {{0x254, 0x1, {{0x3, 0x5}, 0xb5, 0x0, 0xbe, 0x4, 0x16, 'syz1\x00', "b9d44e007e72cc601f1bf4b1bad4938e152810e270a34100bb7843b084fc1920", "8bf6e7ab70dc09b61f7852f8c082c34588fcedc19ec7875452c18206fda708c8", [{0x7, 0x2, {0x0, 0x1}}, {0x0, 0xf30, {0x1, 0x9}}, {0x800, 0x5, {0x1, 0x7}}, {0x5, 0x6000, {0x3, 0x53}}, {0x6, 0x13, {0x0, 0x9}}, {0x154, 0x9, {0x1, 0x7fff}}, {0x8001, 0x0, {0x2, 0x2}}, {0x4, 0x6, {0x2}}, {0x3, 0x5, {0x1, 0x3}}, {0x1000, 0x7fff, {0x2, 0x6}}, {0x0, 0x4, {0x3, 0x3}}, {0x1, 0x0, {0x3, 0x8}}, {0xff, 0x3, {0x0, 0x80000001}}, {0x1ff, 0xfffd, {0x2, 0x5}}, {0x6, 0x4}, {0x3, 0x7fff, {0x1, 0xfffffeff}}, {0x4, 0x400, {0x2, 0xef}}, {0x0, 0x2, {0x0, 0x7}}, {0x27, 0x3f, {0x2, 0x7fff}}, {0x0, 0x6, {0x1, 0x5}}, {0x7ff, 0x1ff, {0x3, 0x7fff}}, {0x0, 0x401, {0x0, 0x101}}, {0x5, 0x9, {0x0, 0x7fff}}, {0x5, 0x6, {0x3, 0x7fffffff}}, {0x54, 0xafab, {0x2, 0x80000001}}, {0x3f, 0x9, {0xd35a85e43b4e5a01, 0x5}}, {0x7, 0x20, {0x1, 0x6}}, {0x8, 0x0, {0x2, 0x1}}, {0x1, 0x401, {0x3, 0x2}}, {0x1000, 0xc50, {0x1, 0x8000}}, {0x4, 0x6, {0x3, 0x7}}, {0x7, 0x0, {0x0, 0x3}}, {0x513e, 0xe4a5, {0x0, 0x4}}, {0x1ff, 0x8, {0x0, 0x7}}, {0x6eb, 0x1, {0x3, 0x3f}}, {0x7, 0xe24c, {0x1, 0x9}}, {0x7, 0x100, {0x2}}, {0x1f, 0x8000, {0x2, 0x7}}, {0x4, 0x250, {0x3, 0x80000000}}, {0xffff, 0x9, {0x2, 0x4}}]}}}, {{0x254, 0x1, {{0x3, 0xfc7}, 0x2, 0x7, 0x3f, 0x7f, 0x5, 'syz0\x00', "0694340693f74ce79649e4fc4650c5c362ce7855c5904da5be162c8b5ab68e9e", "a0fa51669b17202ee0c53999adce5bce3fca67443d85cda1c4a9160c046726aa", [{0x7, 0xc37, {0x3}}, {0x2, 0x487e, {0x1, 0x3}}, {0xe7, 0x68, {0x2, 0x4}}, {0x5, 0x2, {0x3, 0x7fffffff}}, {0x81, 0x0, {0x3, 0xba}}, {0x401, 0x400, {0x2, 0x4}}, {0x0, 0x6, {0x2, 0x16b}}, {0x837e, 0xe8c1, {0x2, 0x5}}, {0x8001, 0xff00, {0x2, 0xffffff35}}, {0xfff, 0x1, {0x0, 0x200}}, {0x6, 0x97}, {0x0, 0x4, {0x2}}, {0x1f, 0x7, {0x1, 0x7}}, {0x4, 0x3, {0x3, 0xfffff13a}}, {0x754e, 0x23, {0x3, 0x4}}, {0x200, 0x4, {0x3}}, {0xc959, 0x7ff, {0x3, 0x5}}, {0x2, 0x6, {0x1, 0xfffffffb}}, {0x2, 0xf0a, {0x1, 0xffffff81}}, {0xa8e, 0x1, {0x2, 0x1}}, {0xa4e5, 0x8, {0x2, 0xe8}}, {0x0, 0x8, {0x1, 0x6}}, {0x0, 0x0, {0x0, 0x4}}, {0x101, 0x4, {0x3, 0x96}}, {0x0, 0x6, {0x1}}, {0x74e, 0x2, {0x2, 0x401}}, {0x1, 0xfdb, {0x3, 0x200}}, {0xffff, 0x3, {0x1, 0x6}}, {0xdcd6, 0x2bb5, {0x1, 0x9}}, {0x3da, 0xfffd, {0x0, 0xa258}}, {0x2, 0x7, {0x3, 0x400}}, {0x20, 0xa1b1, {0x3, 0x1}}, {0x80, 0xc200, {0x2, 0x3}}, {0xab96, 0x45, {0x3, 0x8}}, {0x69b, 0x400, {0x3, 0x5a58}}, {0x6, 0x8, {0x2}}, {0x8, 0x0, {0x1, 0x1}}, {0xfffb, 0xfff, {0x3, 0x2}}, {0xffff, 0xaf, {0x0, 0x9f}}, {0x1000, 0x0, {0x0, 0x9}}]}}}, {{0x254, 0x1, {{0x3, 0x2}, 0x8, 0x2f, 0x8, 0x53c, 0x1d, 'syz0\x00', "f579e56effd9d03a6bbc6f06dd70312e3e42ccec3fd33cef7c2850984c555773", "9f9679120faa19f722a1ee2ec19df42e03e4b76cec252f2ad399dc5053952c2a", [{0x8, 0x6, {0x3, 0x2}}, {0x101, 0x7, {0x0, 0x1}}, {0x2, 0x9a81, {0x1, 0xffffffff}}, {0x100, 0x7, {0x0, 0x7}}, {0x4a, 0x3, {0x1}}, {0x800, 0x7fff, {0x3, 0x3f}}, {0x5, 0x3, {0x3}}, {0xcb, 0x2, {0x3, 0x4}}, {0x2, 0x81, {0x1, 0x20}}, {0x7fff, 0x3, {0x3, 0x3f}}, {0x80, 0x8, {0x1, 0x9}}, {0x1, 0x0, {0x0, 0xfffffffb}}, {0x3eb3, 0x1, {0x0, 0x7}}, {0xb26e, 0x5, {0x2, 0x2}}, {0x4, 0x8, {0x0, 0x1000}}, {0x1000, 0x6, {0x2, 0x10001}}, {0x3, 0x4, {0x0, 0x3}}, {0x6b, 0x1, {0x2, 0x2}}, {0x2d3c, 0x8000, {0x1, 0x10001}}, {0x0, 0x6, {0x0, 0x7}}, {0x6, 0x2d00, {0x2, 0x4}}, {0x20, 0xffff, {0x0, 0x33}}, {0xffbf, 0x56, {0x3, 0x3}}, {0x0, 0x6, {0x3, 0x7}}, {0x0, 0x4, {0x3, 0x6}}, {0xab, 0x8efd, {0x1, 0x5}}, {0x2, 0x3f, {0x1, 0x3}}, {0x8, 0x1, {0x3, 0x1}}, {0x8, 0x1, {0x0, 0x1ff}}, {0xffff, 0x47d, {0x3, 0x9}}, {0xf3d6, 0x8, {0x0, 0xffff8000}}, {0xd, 0x9, {0x2, 0x20}}, {0xa000, 0xfb2, {0x2, 0x1}}, {0x8001, 0x8, {0x2, 0xd0a2}}, {0x3, 0x6, {0x3, 0x1}}, {0xffa7, 0x800, {0x0, 0x3f}}, {0x8, 0xf05e, {0x2, 0xfffffffc}}, {0x5, 0x3, {0x0, 0x7ff}}, {0x68e, 0x5, {0x3, 0x5}}, {0x8001, 0x71a, {0x3, 0x8a70}}]}}}]}, 0xbb8}, 0x1, 0x0, 0x0, 0x20004800}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r5, 0x0, r4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000011c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c6, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1000000, 0x0}) 15:19:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x10d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\v\x00\x00\x00\x00\x00\x00\x00'], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd811) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f00000002c0)={0x1, 0x0, 0x1, 0x0, {0x80000000, 0x0, 0xd99, 0x3}}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) init_module(&(0x7f0000000240)=',&:-&\\d\x00', 0x8, &(0x7f0000000280)='/-:\'[-/\'(^&@[\x00') mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f00000000c0)={0x4, 0x1, 0x4, 0x2, 0x3, 0xbb2c}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x20100, 0x0) mq_timedreceive(r4, &(0x7f0000000540)=""/101, 0x65, 0xdc9c000000, &(0x7f0000000440)={0x0, 0x989680}) 15:19:17 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 15:19:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c7, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2000000, 0x0}) 15:19:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x11d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:17 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) 15:19:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c8, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x3000000, 0x0}) 15:19:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:17 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}) 15:19:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 996.021431][ T3103] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 996.113442][ T3103] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 996.124640][ T3103] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7c9, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x12d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}) 15:19:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x4000000, 0x0}) 15:19:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) clone3(&(0x7f00000006c0)={0x3000, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f00000004c0)=0x0, {0xa}, &(0x7f0000000540)=""/92, 0x5c, &(0x7f00000005c0)=""/173, &(0x7f0000000680)=[0x0, r0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0], 0x9, {r4}}, 0x58) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000780)={{0xa, 0x3, 0xffffffff, 0x0, 'syz0\x00', 0x6}, 0x1, 0x40, 0x20, r5, 0x2, 0x8, 'syz1\x00', &(0x7f0000000740)=['\x00', 'reiserfs\x00'], 0xa, [], [0x6, 0x4, 0x40f, 0x5]}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) write$6lowpan_control(r6, &(0x7f00000000c0)='disconnect aa:aa:aa:aa:aa:11 2', 0x1e) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 15:19:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}) 15:19:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}) 15:19:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ca, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000040)={0x1, 0x0, {0x5, 0x81, 0x4, 0x1}}) r4 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x5000000, 0x0}) 15:19:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x13d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 996.823086][ T3363] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 996.916998][ T3363] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 996.963029][ T3363] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) quotactl(0x1ba7b72c, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000001c0)="85fc81820de822c6bd34cce8c3c779b97c162e51d6a54eeb822ccee2dba4c5ae9b85d369a4ffea410fc0b416363caa970ee0747edbd0f2ee20f80135c0597d0715ead50b5f59dff735d6bfd50d1b65c9ff931a3039cf2d13ecacd996e331a983e67eada42254a4a2bdee5fd65d265863267f24abec2bb3b5faf274ca55ec31902298485fc269") ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {0x0, 0xfffffffc}}) 15:19:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7cb, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 997.208699][ T3363] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 997.226273][ T3363] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x6000000, 0x0}) 15:19:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0x5, 0x2, 0x0, 0x1, 0x86, 0x0, 0x8, 0x3, 0x20, 0x10000, 0x3, 0x9, 0x100, 0x9, 0x0, 0x20, {0x9, 0x6}, 0x1f, 0x81}}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) [ 997.358174][ T3363] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x14d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000040)={0x9, 0x103, 0x0, {0x1, 0xfffffff9, 0x0, 0x5}}) 15:19:19 executing program 5: syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) 15:19:19 executing program 5: time(&(0x7f0000000140)) syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x400002) r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x1ec, 0x15, 0x400, 0x70bd27, 0x25dfdbfc, {0x8, 0x2}, [@INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a7b8340e6ca2926e055237b9e098738e34c2f247787fddf8a6bf9d3b56a67e3baff94ae60f7155ba725ea5d9e8bb2e87d49e4a6d2fe5ffc10a4933180bb423439fd03a2beb44ffa5e8049bcef5dce55fc6025445e11fd73fd2d1267bdb7b4a548e7f4bf6418df48935609b1863b2c023a55e3b65649253520425aabd017014a03a4ab4259fa484bf8e0a70577223874e9260d6cf46a5ad92367358a3758241d5276615ff49c300b9de6ecc9fd6033671b865e5347c3f21b7fc7c2e470204f35f505754ef9208be05dba836aa6a1c02babd36d8c0082c3419"}, @INET_DIAG_REQ_BYTECODE={0xa6, 0x1, "941ed4b9bcc3768a6d000374c9623a014e3e1895873cdb53d846e235a3425df8da7db967d68f227724704d52f5954f1060126bbf96c1d870bc72239d58c1907fb3104b2d76ddc993186f49a5030d4b02a4cf6e24a87772000a18eea5f0e211b3abdf843abad19885653570be509d4f67c848f320b56bb18d3e0d0d92361f6461b3ed25bfb8925778bc425cf4858551039d4a45dd875cefd7678831b55919e80d0247"}, @INET_DIAG_REQ_BYTECODE={0x53, 0x1, "5b9b606bc6e158ed405dbca427e1a4607f4bacebf3a99af599fb2daa32c4e2022688e0e8409b6e78f967a40d2ac9669762b85c64ba399b03edbcc5ed4d8c0ac14b95777bbc74a18a00bbda02e51978"}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x8880}, 0x4000000) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x7, 0x2}) 15:19:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7000000, 0x0}) 15:19:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7cc, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x15d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 997.835024][ T3574] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 997.857355][ T3574] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:20 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) write$dsp(r3, &(0x7f0000000040)="8c7c272581bc02ad79e402ea74d927f987f58c1987aae2c54daac625128300ba964b1aba718d0b2dc10170721d1c21087aa26ebef700574675a2fe23e90362c17409468a848a67946cac3b4ed73377e5f3a24e1ea35af653ef693180d6a937620be4ddd578d29daa5a0a16460a718bff308802156b3dd4fd14b6e45062f5e39a8718a6b2c930279ee0453d1a089fa537c39a6070aa4d050336487b08878bc5d5b02c3a180eec816c12141997af09208c08b296641607f99e85df337ecf6d3525da18b58686d2a23c7a4e2c67624db0", 0xcf) [ 997.888173][ T3574] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x16d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:20 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:20 executing program 0: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0xd0, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x5}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe000}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xce9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xdd1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x48}, 0x20004891) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05062eca29c60a3c"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r1, 0x0, r0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x100010, r5, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x17d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7520000, 0x0}) 15:19:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7cd, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x18d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:20 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000380)=""/247) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000000c0)='/proc/stat\x00'}, 0x30) r7 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@private2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000340)={0x3, @default, r8}) sched_setattr(r7, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001501028008000200", @ANYRES32=0x0, @ANYBLOB="05000107050000f1"], 0x44}}, 0x0) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r9, &(0x7f0000000140)={r4, r2, 0xd1d7}) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000080)={0xa00000, 0x10000, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9a090a, 0x1000, [], @value64=0x2024fe96}}) 15:19:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x8000000, 0x0}) 15:19:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x19d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ce, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 998.944773][ T3869] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 999.042460][ T3871] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 999.201248][ T3871] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 999.278776][ T3871] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0}) [ 999.404165][ T3873] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 999.466099][ T3921] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:19:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000540)=[@in6={0xa, 0x4e23, 0x8, @mcast2, 0xfffffff8}, @in6={0xa, 0x4e23, 0x1, @empty}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x5}], 0x54) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r4 = getpid() ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x43) sched_setattr(r4, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r4}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:21 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4000000000040, 0x188703) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:19:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1ad90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1c000000, 0x0}) 15:19:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7cf, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1bd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x10000, 0x44) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x7) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000001c0)=0x800, 0x2) r6 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r8 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r9, r10, 0x0, 0xd811) ioctl$KVM_SET_VAPIC_ADDR(r10, 0x4008ae93, &(0x7f0000000100)=0x4000) ioctl$VIDIOC_S_SELECTION(r6, 0xc040565f, &(0x7f0000000000)={0x9}) r11 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200400, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r11, 0xc0205647, &(0x7f00000000c0)={0x9d0000, 0x3f11447, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9e0906, 0x8, [], @ptr=0x80}}) [ 1000.176187][ T4097] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1000.199535][ T4097] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1000.224643][ T4097] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1cd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1e000000, 0x0}) [ 1000.404601][ T4109] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1000.431618][ T4109] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1000.451852][ T4109] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33d1, 0x0, 0x1000, 0x0, 0x2, 0x3, 0x4, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000cc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d40)=""/158, 0x9e}], 0x1, &(0x7f0000000e40)=""/17, 0x11}, 0x40000041) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd811) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000f00)={{0x80000000, 0x5}, 0x2}, 0x10) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000ec0)={0x18, 0x0, {0x1, @multicast, 'veth1_to_batadv\x00'}}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r3, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/consoles\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) r4 = syz_usb_connect$cdc_ecm(0x1, 0x8c, &(0x7f0000000540)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x1, 0x1, 0x80, 0x60, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x9, {{0x8, 0x24, 0x6, 0x0, 0x0, "26971e"}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x5, 0x7fff, 0xff, 0xf9}, [@ncm={0x6, 0x24, 0x1a, 0xd7a5, 0x30}, @mdlm_detail={0xb, 0x24, 0x13, 0x1f, "3bd1f706a3e415"}, @ncm={0x6, 0x24, 0x1a, 0x9, 0x7}, @obex={0x5, 0x24, 0x15, 0x7fff}, @dmm={0x7, 0x24, 0x14, 0x0, 0x401}, @country_functional={0x10, 0x24, 0x7, 0x5, 0x3, [0x6, 0x9, 0x5, 0x8, 0x2]}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x20, 0x8, 0xff, 0x3f}}], {{0x9, 0x5, 0x82, 0x2, 0x400, 0x81, 0x80, 0xc2}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0xbc, 0x0, 0x8}}}}}]}}]}}, &(0x7f0000000b40)={0xa, &(0x7f00000001c0)={0xa, 0x6, 0x300, 0x8, 0x34, 0x20, 0x17, 0xe0}, 0xf, &(0x7f0000000440)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x3, 0x1, 0x5, 0x2}]}, 0xa, [{0x101, &(0x7f0000000600)=@string={0x101, 0x3, "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"}}, {0x2e, &(0x7f00000004c0)=@string={0x2e, 0x3, "9995ce878baf2cb3fa2bff7e482de2bfe0c3fc7a957fa0d56a0712933c0cfb670f9bad67ba8228cb8b28a4c4"}}, {0x4, &(0x7f0000000740)=@lang_id={0x4, 0x3, 0x43f}}, {0xe4, &(0x7f0000000780)=@string={0xe4, 0x3, "3b2be2c1c4f1bf892aa51932806307ccb50a51372c5d14ee779e3b845627335655b64ee20edc597bc65188d524239af2808f1109cb8a8e6ea1b2f3992ac10df499393433354f023f12f4aec33e9a1e9c020990f58455f56fa62f2f14460c3cb26e82b13b3ccf6e08fe9ffe66f167c435da48edc8578911e6074416946acca17dbed23e5e0558bf0128a27f95d2cfb6f5cfd31d974034db6887715b4efc59fa67f7ed70a08c4f323bf5f05e7c1e5e0163bfe8d7e05e5705411285d4881508ef52e372d4e8ccfdfcbb15afaa7cf146c08ba16890ab1cc0e12b9f7c749abe80f3624921"}}, {0xd7, &(0x7f0000000880)=@string={0xd7, 0x3, "bd30dc31c41555033bdbd9995f48bc05b4006a6a42bbf4ff2feb90236f3ab185cab53d5ee55fdb1d1e96354c56607ac98cbc802f748a3a5d5755b8cdf9d937aef10e310d2da4d84d51913c83e82b49c514f0dc9b66b2feadc32b568532470b2642ac405cf558a5ce3f1a24070f2b0a469e721a3bd594ccfd10d65d6077c1e04328ba8753d2c6ffe4cd9909c44977176bdd5502cd1b5dffd20ef2edbf87b2839440f7df84c58994bdb0dacb0ee227508a2c5573066384c36879cc9f16172dd9a1fc4927c1c801e3f45a07d1eeeba6f4adff40bb01a9"}}, {0x4, &(0x7f0000000980)=@lang_id={0x4, 0x3, 0x816}}, {0x4, &(0x7f00000009c0)=@lang_id={0x4, 0x3, 0x2409}}, {0x4, &(0x7f0000000a00)=@lang_id={0x4, 0x3, 0x426}}, {0x4, &(0x7f0000000a40)=@lang_id={0x4, 0x3, 0x183d}}, {0x89, &(0x7f0000000a80)=ANY=[@ANYBLOB="89e7835052490c72c4ca5dfb1e39462f7cd228bea50834260e4addaa2a9a380f218b0ff947daa5e533acb3ee0d63b21cc92e5efee372597a32a83e8fa83277fb7bfcc10a9d26524eb7003966115181b84b41071a6dd1d22d88c2237822bc994f1725d7d5d11ec80600a73527794f53fa4924e19823db9a8704280ed10a6afce5cb00ea9371448c4cbc"]}]}) syz_usb_ep_read(r4, 0x9, 0x8d, &(0x7f0000000c00)=""/141) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:22 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x1, 0x4, {0x1, 0x0, 0x2}}) sendfile(r0, r0, &(0x7f0000000040)=0x400, 0x1) 15:19:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d1, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x3f000000, 0x0}) [ 1000.706689][ T4159] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1000.811581][ T4159] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1000.986776][ T4159] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d2, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x50000000, 0x0}) 15:19:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1001.145521][T24021] usb 1-1: new low-speed USB device number 3 using dummy_hcd 15:19:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1dd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:23 executing program 5: getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x4}]}}]}, 0x44}}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x4}]}}]}, 0x44}}, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x4}]}}]}, 0x44}}, 0x0) r7 = socket(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x2c, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {0x6}, {0xffff, 0xffff}}, [@TCA_INGRESS_BLOCK={0x8}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001bc0)={0x11c, 0x0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x40}, 0x8050) r10 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r10, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d3, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1001.395585][T24021] usb 1-1: Invalid ep0 maxpacket: 32 15:19:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x80020000, 0x0}) [ 1001.545865][T24021] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 1001.587900][ T4373] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1001.717183][ T4373] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1001.795643][T24021] usb 1-1: Invalid ep0 maxpacket: 32 [ 1001.801719][T24021] usb usb1-port1: attempt power cycle [ 1001.822133][ T4373] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 1002.525384][T24021] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 1002.615847][T24021] usb 1-1: Invalid ep0 maxpacket: 32 [ 1002.765383][T24021] usb 1-1: new low-speed USB device number 6 using dummy_hcd [ 1002.855418][T24021] usb 1-1: Invalid ep0 maxpacket: 32 [ 1002.861033][T24021] usb usb1-port1: unable to enumerate USB device 15:19:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1ed90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:26 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0xff000000, 0x0}) 15:19:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="020000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd811) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4cc000, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) listen(r3, 0xb4) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:26 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x200003ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1fd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000140)={0x1f, "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"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r6, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1004.282124][ T4524] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:26 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0xe0, 0x0, [], &(0x7f0000000040)=0x6}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) [ 1004.395456][ T4524] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1004.490520][ T4524] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:26 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000100)={0xe8d4, "35d0d77eab0f61cc6ee705c7123ecf9d71fbd31147987e68a313b9c0947d8cbd", 0x3, 0x800, 0x9b5, 0x3, 0x4, 0x0, 0x2, 0x5}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x3, 0x0, 0x0, {0x0, 0x800, 0xfffffffc}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x100, 0x400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) recvfrom$ax25(r5, &(0x7f0000000200)=""/165, 0xa5, 0x22, &(0x7f00000002c0)={{0x3, @null, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) getsockname$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 15:19:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d5, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f00000000c0)={0x1c1, 0x30323953, 0x1, @discrete={0x9}}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1004.845812][ T4524] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:19:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) connect$caif(0xffffffffffffffff, &(0x7f0000000000)=@dbg={0x25, 0x4, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x20000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:27 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {0x0, 0x0, 0x3}}) 15:19:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r6, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d6, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1005.450896][ T4733] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1005.583333][ T4733] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x20d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:27 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x4}]}}]}, 0x44}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@remote, 0x58, r4}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(r5, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r6 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x800, 0xd, 0x80, 0xfff, r7}, 0x10) [ 1005.688573][ T4733] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d7, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dri/renderD128\x00', 0x800, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x1}, 0x16, 0x2) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) setsockopt(r2, 0x4, 0xcfab, &(0x7f0000000000)="2f634583c627fa9cf0228871c11b2a14ad61d2a690f36aaf9193df8dde690879ed3e45d7d14a2d0f0c888b7a01b87b99c2ee3c233234d277e8b17498185c47697629c51d5600cd7714eee93cd7f9ed82fb83b669b1f28123ef7806e1ff41c4bc21d9bfc7656f652a0282d72e390ac54cdcbb756499b71f904947487643b4f0a80823c7fb7080046eb2faff2f7fc537e22a1debeeb7315560249514ffeee002841dec7ae95a4eff1ebde3bd6fd32dc62b11c0b20d6dfd03d79bd88f45c197615f05e10fc75f0dbf8ebbc533d838205052bd8f452cee74ad32810f95d8c138aba6f4419e4ab48519cb25f0614e802d2d2102d689fe2d9f", 0xf6) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1005.856883][ T4789] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1005.883697][ T4789] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1005.897790][ T4789] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 1006.111448][ T4839] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb0554"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1006.179263][ T4839] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1006.280361][ T4839] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x21d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d8, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xe53a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f00000000c0)=0x8, 0x4) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r4}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r6, 0x0, r5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/locks\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1006.531429][ T4967] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1006.552312][ T4967] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1006.574454][ T4967] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x44, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:public_content_rw_t:s0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x9004) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r4, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7d9, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1006.945045][ T5028] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:19:29 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {0x7}}) dup(r0) [ 1007.017927][ T5090] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5090 comm=syz-executor.3 15:19:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x22d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x82002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1007.245513][ T5064] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5064 comm=syz-executor.3 15:19:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7da, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0xc, 0xffffffff, 0xfffffffe, 0x0}) 15:19:29 executing program 5: syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000000)={0xc, 0x1, 0x0, {0x0, 0x0, 0x0, 0x44}}) 15:19:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0215c000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020003009b05b8cabcd14ee20c22534e7fd465ae418b93a77ce1e41664022d41", @ANYRES32=0x0, @ANYBLOB="040001000000000008000100", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x64, 0x3) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, r2, 0x8}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r4, 0x0, r3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x23d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1007.926137][ T5226] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1007.956845][ T5226] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in=@empty, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1008.069376][ T5226] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7db, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x24d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1008.325709][ T5226] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000140)=[0x7ff, 0x9, 0x0, 0x7, 0x7, 0x0, 0x4], 0x7, 0x4, 0x4f10, 0x5, 0x5, 0x8, 0x5, {0x0, 0x77a, 0x8, 0xb3, 0x1, 0x7, 0x8001, 0x7fff, 0x7, 0x0, 0x6, 0x4, 0x7, 0x5, "2f4e39585299e6f36e03f90a84c89c3c2e3b6dea30e907d4788cd5666c7e2351"}}) sendfile(r2, r3, 0x0, 0xd811) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0xc01c64ae, &(0x7f0000000040)={0x1, 0x3ff, 0x7, 0x101, 0x8000, 0x3, 0x1}) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x422000, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(r5, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) getsockopt$ax25_int(r4, 0x101, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x4) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000240)=""/150) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r7}, 0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000480)=@sack_info={0x0, 0x7, 0x6}, &(0x7f0000000100)=0xc) r8 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r8, 0xc040565f, &(0x7f0000000000)={0x1, 0x103, 0x0, {0x0, 0x0, 0xfffffffc, 0x7}}) [ 1008.463054][ T5226] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1008.597814][ T5226] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7dc, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) ioctl$TCGETX(r6, 0x5432, &(0x7f00000007c0)) sendmsg$qrtr(r2, &(0x7f0000000780)={&(0x7f0000000040)={0x2a, 0xffffffff, 0xfffffffe}, 0xc, &(0x7f0000000440)=[{&(0x7f0000000140)="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", 0xfc}, {&(0x7f0000000080)="e71fd075cb5b41bc5e8c7519757c0c8375c9a6e575cff390e5332dd8c4129dc85016ea5fb0ab93ac25facc1f52719613f05104200c974b87a8c1bf7870e013b5c2d96b97876364e4d6a94f114305f57feee627805698934a3cf2ce8c4a913807a58ec5fd134fd995c66bfee7229286fcc0689eecb9c7", 0x76}, {&(0x7f0000000240)="2cdf6028a45a37f032969e91f3c6e20c67790b9f5c818c704c1c3df5e99893e902839a6daeb07b8686a8e32e53cd07bd04aea94acfefd41b1260edbc261cd85e1657fab87204effc07af6e41c1c146ee562649dafbb18d4f7b6fd36e42b64fb5d68721210d838173cb06798cff3747f44d808df38d42764bc68b01", 0x7b}, {&(0x7f00000002c0)="3d904d6cc698e27d0b112cec21bcefb3ef6ca767742808091aa1bce1ebe0676ad6f81c7b698e1b7cf7fdd296b651d8d0a1abdd4a637d0c63ee6c3097336678b0fba4ba277268517cd906dbab5548ec061368b25db80f6f7f2ff2b109c1a8b0ffcfab1894f7335ee4f1bd7f38a1b664", 0x6f}, {&(0x7f0000000340)="58dd9371aabae7783f5a1ea0a9be1cb96d7042a9e473f0f130e4b784781ddd3d5c0abefe99ce393f40469e237731155be801a37232d6bc8af853535cf1c6b02095e7708c1ff1031192859e5ed51661a121bb284cbdb695393ea012c452aae0b0d39095ad6b70c2370b456d92a67e78e159e4f8f3df4f3ef63ba9cb2d3def3a94e571dc3254954ee001bc1cc9476b0e5f0d5c9d46ad1a6bcb78e0523a6a12a04c3f99b3b395edefa1fd156714d9f54fbe3e20c2ea70c61e3c5ee01ba23a5b65c1e02d39bcceab5437996079e0", 0xcc}], 0x5, &(0x7f00000004c0)=[{0x40, 0x104, 0x0, "f421ddd043a0cc2fd128132232feb77d70fa71e3e7251b659038085fe5664fc226d41cea6d5e5b21320a7340e259bb63"}, {0xb8, 0x116, 0x1, "a60e730bfe629e0bc93456e317858dc3b43ff76342f550f14ed0ffc69efcd57b9e124e9113abd8ce01875c07bfaaf945a968b2c5a3b279a9ebef3c02a3ee213201c4269691d69098ed386bddcd9f09debad2ba77fdd82a59d9d05e260d8f33b83a08a360f4cda9d66158888be05b658355756cc08a13789fb5c6d0d83d1880df8ae3cf1bd488e4eb70964e28130db6a76c3581367e2c669c78574371b6a43a5126b8"}, {0xf8, 0x111, 0x6, "a6e587fbbd9bfe169aac314e5d588a113c48024f4640501f203e13ed781746ff4bfd59231579148f0c6b323f6d4d0ed3ed39f6690b902e432aa39f2dea24d353cd82d9b941127a872231ad063c87c0667ad78ac026f037e02c511ab786414b9f807e5eaeae09fddf3b959605847930fa9e3ef8f6143019fd3fed4b99dd54e46878fcb4e4ea1e4240421d6c817f0057072054a22da48d596f44db542f0da9ef095b818192dcbcab9fd5ecf43141ab55244a3de2b2c22ec3aca7e18fafd1f7ae9b82174e32510942e2a13b6bcc4e926ee373e1ffd8b62b31f6b9dd66d4907b77f06e25880c"}, {0x98, 0x11, 0x0, "f7f04ace36026423cabb741e3e2aef2338f344473ae8bd977abbf53cbefefda74e013e8ade7adb0dd9f45243775f8b4d921ef6ae2435a4db8e3021dc5adc35e326a50ca89aa0d02fe4e008ecbd6caa7fee5b1287eda9fff880cf40400ab306e0749291ed44c3290830b6e5034c504198ed8147a810468fd1456f798ccafab6913fc86caf06944c"}], 0x288}, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) connect$inet6(r2, &(0x7f0000000800)={0xa, 0x4e23, 0x800, @empty}, 0x1c) ioctl$KDFONTOP_SET_DEF(r7, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x25d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000240)={0x3, "ee3909155ecae17f96c8c06dc9734af55cd7ace0"}, 0x1c, 0x0) r0 = getpid() r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000540)={'filter\x00'}, &(0x7f00000001c0)=0x44) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5, 0x1000000, 0x81}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11, 0x8000}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0xf, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r5, 0x0, r4) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f00000000c0)=@int=0x5, 0x4) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000440)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) 15:19:31 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x26d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7dd, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1009.585771][ T5533] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1009.599654][ T5533] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1009.613438][ T5533] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r2 = dup(r1) connect$l2tp6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x7, @private2, 0x7}, 0x20) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r4, 0x0, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd811) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f00000001c0)={0x4, 0x1, 0x2, "bf38bcbcfe357d5d1450b48ec9d276e4c51be950611f1c82c6b4598e261d6e91", 0x41495043}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x1, {0x0, 0xff, 0x101}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000040)=""/244) 15:19:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7de, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1009.909462][ T5607] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1009.923242][ T5607] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x27d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1009.957529][ T5607] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x0, 0x0, 0x6, {0x3, 0x0, 0xfffffffd}}) [ 1010.112853][ T5602] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1010.162640][ T5602] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1010.214052][ T5602] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$rds(r1, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000140)=""/202, 0xca}, {&(0x7f0000000040)=""/105, 0x69}, {&(0x7f0000000240)=""/144, 0x90}, {&(0x7f0000000300)=""/91, 0x5b}, {&(0x7f00000000c0)=""/27, 0x1b}, {&(0x7f0000000380)=""/177, 0xb1}, {&(0x7f0000000440)=""/51, 0x33}, {&(0x7f0000000480)=""/149, 0x95}], 0x8, &(0x7f00000005c0)}, 0x4000080) 15:19:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f994"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r4 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f0000000000)={0x9}) [ 1010.377108][ T5787] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1010.467811][ T5787] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x10001, 0xa280) 15:19:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7df, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) r6 = memfd_create(&(0x7f0000000000)='#-\\/\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r5, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r6, 0x0, 0x2000}, {r1, 0x0, 0x0, 0x10000}, {r1, 0x0, 0xfffffffff0000000, 0x1000000}, {r1, 0x0, 0xfffff000, 0xfffff000}, {r1, 0x0, 0x8000, 0xfffffffffeffb000}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r8 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r9, r10, 0x0, 0xd811) ioctl$DRM_IOCTL_MODE_SETCRTC(r9, 0xc06864a2, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x1], 0x1, 0xfff, 0xfff, 0x4bc4, 0x3, 0x5, 0x82, {0x1, 0xfffb, 0x1000, 0x1, 0xf09, 0xc88, 0x1000, 0x20, 0x8, 0x81, 0xd5, 0xd2, 0x5824f72, 0x101, "32080ef7afbcfa17834dad77472db3573ffeee28a8c8ddcf1525b7855747334b"}}) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r11, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1010.628062][ T5787] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x28d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x1fe, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000040)={0x0, "e6a47515d775bc3e879d568b0eaa1a59c76c5c34a6bb56eb71a364b3ec5e5d3d", 0x5, 0x400, 0x4, 0x9, 0x8, 0x3, 0x26, 0x80000000}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x5}) [ 1010.804981][ T5822] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1010.905558][ T5822] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1010.929775][ T5822] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:33 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="44000000104304c17f7b44db71aa4903941c001f", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028008000200", @ANYRES32=0x0, @ANYBLOB="0500010005000000"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0xd, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=r0, @ANYRES64, @ANYRES32, @ANYBLOB="05000100d707da54d82494942126a2ea500161d205000000"], 0x44}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_capability(r1, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x8, 0x2}, {0x7f, 0x3}]}, 0x18, 0x2) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0215c000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020003009b05b8cabcd14ee20c22534e7fd465ae418b93a77ce1e41664022d41", @ANYRES32=0x0, @ANYBLOB="040001000000000008000100", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x64, 0x3) setfsgid(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xd811) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="44000000ff00000000ba7082693bca231debc9ec3029b898dae551494887b1308abf4423fd39348d70137710976c2f5b3f8a5a768bb53c1b700b06ab1e95b233b46b262b61fbe624637ea1a1b8f1cd5c2e04dc4a8826be232106", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028008000200", @ANYRES32=0x0, @ANYBLOB="0500010005000000"], 0x44}}, 0x0) ioctl$LOOP_SET_FD(r8, 0x4c00, r9) 15:19:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000000)={{0x73, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 'nq\x00', 0x4, 0x5, 0x4}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x4e24, 0x2, 0x4, 0x2}}, 0x44) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1011.224291][ T5917] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1011.237182][ T5917] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1011.249514][ T5917] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 1011.269706][ T5941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17168 sclass=netlink_route_socket pid=5941 comm=syz-executor.5 15:19:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1011.332951][ T5953] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:19:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x29d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1011.404904][ T5957] IPVS: set_ctl: invalid protocol: 115 172.30.0.4:20000 [ 1011.442252][ T5941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=255 sclass=netlink_route_socket pid=5941 comm=syz-executor.5 [ 1011.491076][ T5954] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1011.526176][ T5956] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1011.547655][ T5954] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1011.551988][ T5953] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1011.559361][ T5954] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 1011.587884][ T5956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=255 sclass=netlink_route_socket pid=5956 comm=syz-executor.5 15:19:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:33 executing program 5: ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000000)={0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) read$rfkill(r5, &(0x7f0000000080), 0x8) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r7, 0x0, 0xd811) accept4$rose(r7, 0x0, &(0x7f0000000040), 0x80000) [ 1011.764322][ T5960] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1011.835976][ T6035] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1011.927902][ T6035] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e1, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) setxattr$security_ima(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.ima\x00', &(0x7f00000005c0)=@v2={0x3, 0x1, 0x14, 0x1, 0xb1, "324c7264ac4963961b92c78f928c25fb184a04ace6b9d7236cb228da0961b8e7e7fd6b1bd6c45a4f5874987ae101501a5b5933b99b9bf2b76895cfb7a8eea3221b5a71f0562f6c57e3f8a3111328739e9df655eae474f9662b04416f9a72bcc1cf4f20690d6ccf0c6ea87d8a7052b9c5ced3d2051363b17a51277b08c311a987d075db847669e8e24c5ecba0c344a2a52e0a297e5a0fbaac4da125b1bf52758956ab40f976a2b3fb72a6bdaa1d20b3c13e"}, 0xba, 0x1) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40040}, 0xc, &(0x7f0000000b40)={&(0x7f00000006c0)={0x45c, 0x3f3, 0x200, 0x70bd28, 0x25dfdbfe, {0x5, 0x2, 0x9, [0x3, 0x7fffffff, 0xf0ed, 0x5, 0x0, 0x3, 0x0, 0x3, 0x3, 0x7, 0x0, 0x80000001, 0x1, 0x3, 0xce, 0x81, 0x6, 0x3, 0x0, 0x1, 0xfffffff8, 0x9, 0x40, 0x40, 0x3, 0x3a68, 0xd5ad, 0x6, 0x3ff, 0xff, 0x7, 0x4, 0x5, 0xc8b0, 0xdc, 0x9, 0x80000001, 0xd8f9, 0xffffffff, 0x4, 0x4, 0x6, 0x8, 0x55, 0x8, 0x3, 0x3, 0x5d06, 0x3ffc, 0x2, 0x7ff, 0x6, 0x4, 0xf72c, 0x44ca, 0x8, 0x9, 0x3, 0x4, 0x1, 0x800, 0xffff, 0x3, 0x2], [0x224362b9, 0xffffffff, 0x401, 0x9, 0x1, 0x0, 0x0, 0x80000000, 0x818, 0x7, 0x6, 0x4, 0x4, 0x0, 0x5, 0x5, 0x10000, 0x1, 0x9, 0x7f, 0x8001, 0x5, 0x4, 0x20, 0x8, 0xfffffffa, 0x0, 0x3, 0x2, 0x7, 0x4, 0x101, 0x9, 0x6, 0x4, 0x399, 0x20, 0x7fff, 0x101, 0x5, 0x6, 0x6, 0x9, 0x9, 0xffffff01, 0x0, 0x3526, 0x5, 0x7fffffff, 0x400, 0xfffffffd, 0xfffffffc, 0x9, 0x1, 0x0, 0x7, 0x8, 0x161, 0x6, 0x8, 0x4, 0x2, 0x7, 0x80000001], [0x7ff, 0x8, 0x6, 0x6, 0x3, 0x3, 0xad9, 0x65e, 0x80000000, 0x401, 0xe34, 0xfffffffd, 0x2, 0x5, 0x8, 0x5, 0x6fb, 0xfffffeff, 0x6, 0x2, 0x1, 0x81, 0x3, 0x6, 0x84, 0xadd4, 0x6, 0x0, 0xc5f2, 0x7, 0x43, 0x13ce000, 0x8, 0x8, 0x8, 0xfffffffc, 0x4, 0x80, 0x0, 0x9, 0x0, 0x8a, 0x737, 0x101, 0x81, 0x4, 0x3, 0x1387, 0x0, 0xffff, 0x6, 0x8, 0x5, 0x200, 0x1, 0x8000, 0x7, 0x6, 0xfffffffe, 0x51a, 0x3, 0x40, 0x1fc0, 0x9], [0x9, 0x7fffffff, 0x2, 0xfffffff9, 0x8, 0x2, 0x96, 0x80000001, 0x4, 0x3, 0x8, 0x0, 0x5, 0x800, 0x4, 0x4, 0x1, 0xffff4dcb, 0x1, 0x7, 0x5, 0x0, 0x80000000, 0x4, 0x20, 0x4b40, 0x603, 0x1f, 0x401, 0xfffffffd, 0x3, 0x8e, 0x6, 0x1, 0xfffff800, 0x6, 0xc0f3, 0xffff0001, 0x5, 0x5, 0x3552, 0x8, 0xffffffff, 0x5, 0x9, 0x1, 0x1ff, 0x3, 0x9, 0x2f3688d2, 0x7fff, 0x6, 0x1, 0x7, 0x9cd3, 0x8, 0x6a00000, 0x8001, 0x1ff, 0x0, 0x7, 0x8, 0x4, 0x183], 0x3c, ['bond\x00', 'bond\x00', 'security.ima\x00', '+$.G!:\\]\x00', '%$@\x00', '', 'security.ima\x00', '/proc/stat\x00']}, [""]}, 0x45c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80d0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000440)={0xa20000, 0x9, 0x9, r4, 0x0, &(0x7f00000001c0)={0x990901, 0x4, [], @string=&(0x7f00000000c0)=0x6}}) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f00000004c0)={0x6, 0x4, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0x0, 0x0, 0x2000800, 0x0) [ 1012.004313][ T6035] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2ad90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080), 0x10) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20002, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f00000001c0)) 15:19:34 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000040)=0x2c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1012.292975][ T6099] QAT: Invalid ioctl [ 1012.325099][ T6096] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2bd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1012.325246][ T6096] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1012.325258][ T6096] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000040)={0x0, @adiantum}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1012.567226][ T6177] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e2, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1012.643590][ T6177] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1012.676987][ T6099] QAT: Invalid ioctl [ 1012.707807][ T6177] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="020000000000082c546bfa823f1973459b9185d617ce0000a2e5eecfe49f55b1538345d0f5bf80fc93743f499183905952e5177e851a56507ba741340cf341dd01123cee328375c2e68b853b11cf83742550ef7e5eb2ff275ebf313dd1474276abc2993fd3e48f435cec58aab0d7814d8e22668b0dcb4893452ede012e87d17b7b543184f7f844e71c94854121fc9c72a4536abd73d8ff5468bc37d8d44f0320b0116050506645dcecef983063adcede39c1b76ab5262cb48a67b20c8ab1d5051be21131bc9a2527cd5adf786612f81bc0d09c7efd"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4000030}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) keyctl$dh_compute(0x17, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000540)="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", 0x1000, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x147, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) keyctl$reject(0x13, 0x0, 0x1, 0x60, r4) openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/tty/ldiscs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1012.862979][ T6209] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1012.920865][ T6209] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1013.043970][ T6209] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028008000200", @ANYRES32=0x0, @ANYBLOB="05000100059b9600"], 0x44}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = getgid() fchown(r6, r8, r9) ioctl$IMADDTIMER(r5, 0x80044940, &(0x7f0000000000)=0x32) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r10, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:35 executing program 5: ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000000)={0x9}) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x1404, 0x208, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 15:19:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2cd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1013.444523][ T6255] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1013.483834][ T6255] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e3, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1013.566255][ T6255] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2dd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1013.630389][ T6383] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=6383 comm=syz-executor.5 15:19:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1013.774177][ T6465] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) inotify_init() r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x4}]}}]}, 0x44}}, 0x0) r6 = socket(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x4}]}}]}, 0x44}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=@expire={0x104, 0x18, 0x1, 0x70bd2b, 0x25dfdbff, {{{@in=@broadcast, @in6=@private2, 0x4e23, 0x0, 0x4e21, 0x7, 0xa, 0x0, 0x80, 0x84, r5}, {@in6=@mcast1, 0x4d4, 0x2b}, @in=@multicast2, {0x81, 0x100000000, 0x3, 0x1a, 0x6, 0x200, 0x7fff, 0x3ff}, {0x9, 0x100, 0x6, 0x6}, {0x6, 0x3, 0x5}, 0x70bd2b, 0x3502, 0x2, 0x3, 0x6e, 0xa}, 0x2}, [@offload={0xc, 0x1c, {r8, 0x3}}]}, 0x104}, 0x1, 0x0, 0x0, 0x20040051}, 0x91) [ 1013.866783][ T6465] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1013.943518][ T6465] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2ed90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x800, 0x200bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000340), 0x7}, 0x40000, 0x0, 0x4, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02004000000000007250fcc7108d8faed36e30a800ac3d4f462ae2553f40013c9c0057cd8984bdf8dbecbef4cce7e98f7b02e667389bba3a4b9af4d3789bfadcf1e25dab8f37973c497acb3a7343c4804aab1e146855421e88d953f50a77d30531e6390b4b113e765ed995ead07a6eb2f46404ccd273248fa3aa0964811b333f78cd62cf753319c09c19d1e05a991401afb89088b340ca7b662e7fa1b73d4fb02004f2a7f5ad083da31fd05d284dca24aeda2d8f735fa752ec0dacafe34a7b358d06cd35f14e92f709abcd9b8c0077a3a4"], 0x2000, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000001c0)) r1 = getpid() r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xd811) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000440)=0xfffffffe) sched_setattr(r1, &(0x7f0000000480)={0x38, 0x2, 0x30, 0x0, 0x7ffffffb, 0x0, 0x100000000}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r1}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x2c2147) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f0000000540)={0x74, 0x0, [0xd4, 0x7fc0000000000000, 0x74bc]}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='romfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x2fd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2004a114ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c00000000001190500000300480000000a0000003c0001002c0001001400030016f8bad353dad6b8000000000000000014000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000075292c00010014000300fe88000000000000000000000000000114000400ff01000000000000000000000000000108000700000000002c000d0014000500fe800000000000000000000000000000140004"], 0xc0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e5, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\"\n\x00\x00\x00\x00\x00\x00'], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x7, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r3, 0x0, r2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x30d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1014.660452][ T6624] IPVS: ftp: loaded support on port[0] = 21 15:19:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e6, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1014.868890][ T6678] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=6678 comm=syz-executor.0 15:19:37 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8, 0x107200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYBLOB="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", @ANYBLOB="00000000000000142400128009000100626f6e64000000001400028008000200", @ANYRES16=r0, @ANYBLOB="0500010005000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x5}]}, 0x1c}}, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0900000096ddaf64acc0b0363f0132a46243733d45cb2009c39b8d8689bc77a956f79a6700a2904a09e8b9a8043ac3a4c36ce0f1670966d300100000c27ca0ba43bd2199913e06cec8071a493f0f1e50ade2a0013715cc", @ANYRES16=r4, @ANYBLOB="08002cbd7000fbdbdf25040000000800020007000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x8000) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f00000015c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x108c00}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x404c014}, 0x95412f10a53d1f93) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001640)=ANY=[@ANYRES16=r6, @ANYBLOB="ba710100025c2b0008000000000000003044a568148ea76cde91b81ec2e158a8591e1d4e6bb0073d05cc643c827c6b1348b2228c2ddc5eabca498d7f8cf593dfcce65c5113e2745212418fb68f368534fe0e60f29bfa58e149db3ca44082c26c3099174ffbf68c87"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r5, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000016c0)=ANY=[@ANYBLOB="010600000ae6c1e016a4687963b3608ace7192b501fb70e674044cfac1662b2389df4689ae49bff0e76f8c345c5d6542749eb749390e3d8341e9ace1f6c3e3e6fb1892b6c94ae4eed4190f7d842412b3b0cd8602c86adc40ba989aeb168d157527a81ea44526c3a0c480", @ANYRES16=r6, @ANYBLOB="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"], 0x168}, 0x1, 0x0, 0x0, 0x40}, 0x2008000) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x3, 0x2, 0x0, {0x0, 0x0, 0x200}}) r8 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0x1, 0x100) fsconfig$FSCONFIG_SET_FLAG(r8, 0x0, &(0x7f0000000540)='dirsync\x00', 0x0, 0x0) [ 1014.978114][ T6678] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1015.058962][ T6678] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0) [ 1015.150218][ T6678] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) ioctl$SIOCX25GCAUSEDIAG(r6, 0x89e6, &(0x7f00000000c0)={0xfb, 0x6a}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x31d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0) [ 1015.539760][ T6688] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1015.543824][ T6719] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1015.665637][ T6781] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1015.781287][ T6781] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1015.823083][ T6688] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1015.848932][ T6781] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 1015.973709][ T6901] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:19:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x32d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e7, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0) 15:19:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r5}, 0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0xfff}, 0x8) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0xd811) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) sendmmsg$sock(r8, &(0x7f0000009c40)=[{{&(0x7f0000004b00)=@x25={0x9, @remote={[], 0x3}}, 0x80, &(0x7f0000004d00)=[{&(0x7f0000000480)="284850fa7d564ea2ddcee4c7b995fd8183efd4432a6a7b24716907e4903e407448ccf69ad229482232b9a06f1a", 0x2d}, {&(0x7f0000004b80)="5c3cfd2477d6b752597bd94d33b54a277920671d26a5b4c44a9907fa3fc5ad51ff86111b5c37ef2d6aa8adc74c862be10036d765e26ad0e57e2ab9790ce37a", 0x3f}, {&(0x7f0000004bc0)="9232e1001e398452733012e52b6b9df1c0f0860866cec4d97e0bfdad4438e12d80c7f6cc83cf86d3229121fed47bda63b2ba1a2793ee15e18b4aace383ec77c3c4287275646f38e76d398d7340cd49a54fadb93f652a1c4b9d9f108a1d7803c66523bd6b1f6bf00b", 0x68}, {&(0x7f0000004c40)="d98263022eb45447de4e4e64524bca1de434b983bc8751b39c56c89fa7856a8590b1799ee2584be9c40163a116792f9324e87ef23bf0277fbab50c39d8ea3f641ecbf7047e20f1cdd272f1370aa443df9ef2763d025e9cdf3026b39003f7a06db91dc8cd9bc7eba129d4cebbce382623c7021a4ac0e1cbe6904be15491b3a341659668d931f0028fbb", 0x89}], 0x4, &(0x7f0000004d40)=[@timestamping={{0x14, 0x1, 0x25, 0xe5e3}}, @mark={{0x14, 0x1, 0x24, 0x8001}}, @timestamping={{0x14, 0x1, 0x25, 0x147cb926}}, @txtime={{0x18, 0x1, 0x3d, 0x675}}], 0x60}}, {{&(0x7f0000004dc0)=@rc={0x1f, @any, 0x5a}, 0x80, &(0x7f0000004f40)=[{&(0x7f0000004e40)="efd848b204834c962b6599c7ab278d5c73da1d152278df668793597d176e1fb465dd198925abde4669f5627c78e0602c64a6df4e373b02d971bd183c5915cbe5854964813959c12adac60ae10af091428517d0895a5a79a3ffaf41a43afdc35306e77922df836ab058fcc1736dffab7779a70922af4caf5cf8d79e2d0ee516e8a30db54b6562cc3203278b8626faeef47ff0bc73821ade6b37f7af0133c51ed7635fe34cad4599d359586ef2719bd60953216590dd9250082e8796204e3236ab27f1d496f5", 0xc5}], 0x1, &(0x7f0000004f80)=[@timestamping={{0x14, 0x1, 0x25, 0xffffff7b}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x60}}, {{&(0x7f0000005000)=@hci={0x1f, 0xffffffffffffffff, 0x3}, 0x80, &(0x7f0000005180)=[{&(0x7f0000005080)="3c5e12b0452569bfceb7a04892479370c3c7439cbd9172a6972e39ab87bf2e9df604030a5db1889c88f515d03b24c06048f623aeb6cb69fd29639698d82e71c0938a0a1470794af681", 0x49}, {&(0x7f0000005100)="d35c768b0bbad52cc3caf8c57e0a1eef49f182f6a8ba1b8741f2d0928db090c3b4d4a616a50434be2b5e1ad6d5924fdf4e9eb3", 0x33}, {&(0x7f0000005140)="56472ed8cb7125e3a5e718b0071b49", 0xf}], 0x3, &(0x7f00000051c0)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x5ea5}}, @timestamping={{0x14, 0x1, 0x25, 0x3ec0}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x60}}, {{&(0x7f0000005240)=@ipx={0x4, 0x6, 0x3, "814317063102", 0x20}, 0x80, &(0x7f0000005680)=[{&(0x7f00000052c0)="b1170a7b75a854184c9883ef49b0dabb16bd15e76753c33b1ad8416c019a77bd8b0536ec98789f42eedffc173290c7771979832677c0b2c1849ef729628ccb2c6566052cae7730c792949d726f80b96b5b73dd12047e887803f17883cb5f2b0194345fde35fa5f4143520a70c8bc83f0358edd166a2f04c7e02a05eee6290fcc907607d20c065990ae3d4e6ef6938fd51756870f4977c4ad62b5908be3df213935fa2c06b2b3a68c973db53ded378ef1bc391de49b45bfb897ee43b104442bb73df0a7ed9db0243b47e90643d14bbf8f565285f2d363bb21", 0xd8}, {&(0x7f00000053c0)="2210b6fded35d22c859403f860a19d9a83598a09099225995028", 0x1a}, {&(0x7f0000005400)}, {&(0x7f0000005440)="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", 0xfb}, {&(0x7f0000005540)="522d5e372d311fae975a577b876319d5b55fda618ad21d17b379e29fba268e0c6307ad7f38c41ec6eb5a54b8e11f97f79c85af4f61a15661cae54714702a0ef8b257d721988a5573089268a8164f454d94babd86911732c2c9f9c23e1fde0ee66e067c29a58d5f49c8be6efe89f54b606bd11083f852884b1737069471faf783eea21bc333e158697668e6302ced04ab493aae87bad7528481457bffde0c081a03a2ec25e6d03bbf0d1a362e47f902adfcd84e17b9a9827376f19ea25553ed5bbd14ba9b3ea4a2f38f193331c3a57e951ffd1c43fc012e7d18c9c7fb9f2f8fe8e7e96b0598fe4662529a06c2b8a7", 0xee}, {&(0x7f0000005640)="6bddcca604d9a2222171297a", 0xc}], 0x6, &(0x7f0000005700)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x60}}, {{&(0x7f0000005780)=@pppoe={0x18, 0x0, {0x4, @random="66641f8d410f", 'veth1_to_bridge\x00'}}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000005800)="f66d7813a7d9f83ec71a714bde2db774030e0711bf95664d4ed6298d50794b0cd0ccab9335b1622aa11d7b0d59bab1ea17725549a8a6dbd8acbb555e3adb1e5c065e70abd48e382c2288c0ac8196dc7e7c3aa5de06aafd428859046af951710fbfbb38561d029c4e671266898cbfb69f7b31265064294476659b1a449e3f4c18ffc0fe53d1d4a1d3178d7db8624f132e0fe1e474d0f6e58a47abd313b79f5e7f01012375e6d0de67a3e41e4246a6de478ff2a11116f17c7b07ff4c8157f5137f1b3b08", 0xc3}, {&(0x7f0000005900)="10dbf1", 0x3}, {&(0x7f0000005940)="09b13832d1060f36a36b1cf4a69db83b46ee4c13e5904f256d9814f64d6baaedf85a04a2b127f81b2a092b8eb458a1b597165c4cf821f68df4f097d67a8cd7087c002d8eddb46b5f4dbe07bb8a632b99fd94cb13f5a408951b2b96a041e4c7174117001e97bf1fd8f16cde934a50b4d565d5411403ed28b5240a30aef6c46fce40d99644eb13c1785853c6fc4be8741a013a78fb1573d72a8e550b9e98ea24e9b20dc19b1db76e902e3e9a27a4db1bf8f134d506e5c9c6e00debba5ca927651307dd5e2a27e52e04cffb7a2f3261553c2760d808796f4cb68554ef381392c20b1a4b10587785efc591a903", 0xeb}, {&(0x7f0000005a40)="5b862976d2cb4c3a3bdcbf9eab", 0xd}, {&(0x7f0000005a80)="8192fc57d32088353faa5ea6e9e016b0144f2238f932357f03e885bb25c6761a14a9dae844a000414e64e008d6b89841fac3202a1ea9204747f5376d062dbc32706a7d93b68cdbe008dff8fa89961cdcde710e3eb8d53735c0d63d1a650b942c854c0a260f16d12cd58d0603b9d20f30a6beb7a886138a5f63aff38732fd81a31c30ca0210810f0b068f1943", 0x8c}], 0x5, &(0x7f0000005bc0)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x18}}, {{&(0x7f0000005c00)=@tipc=@name={0x1e, 0x2, 0x1, {{0x43, 0x4}, 0x1}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000005c80)="fd1a9268c84aa34190693c441fe874b3a31fed783b126e87e9c36618ff859fef253a65889791029308289db8f20ed7d303de54431f4d52608296789217fcbc5c8b5acf14afdb0dc82ef86ad32696e846e0164efd738ba005041411f0e8d11fd14870d2", 0x63}, {&(0x7f0000005d00)="117f007a016e9469779f3566081319f4d4df6a456d714a2ecb48386745a224b73434be707a9db783406afe72ad9cc2585de6b4e90e2d09b3c85f9013d1c7e35289e208d67a9d51c8e82247718adc476c6341590e0ca94c68cb3a573af4a7215242251afa063dba1d9f18bc4a373b827a8eb91f16e7552259b447274e08a20598fb7fb01a11fe950b00", 0x89}, {&(0x7f0000005dc0)="7a411dc37327590c1df1425631e614cda42013b1a0c25795e33d3cdab98c631bb15287a03c101f23b38cf9f44d49f5b722daa0f03679b797ba2a87cdc679856a25784a0fe955590473852c0d10124bfef4c81a4adca86b202f62b601aeca1e277786", 0x62}, {&(0x7f0000005e40)="4c63559c46ee1f881c1c", 0xa}, {&(0x7f0000005e80)="c454988bbf61be3855fcd8fd307297b80e8b590cf930ac", 0x17}, {&(0x7f0000005ec0)="90d7773ee07860cf7928cfa359ff345548175891decb92e948de377f3087f93eacb63dcabfe8d79e18fc9209b79bae9baf1f33b09b07078eb030cbe9ec2bb2a0ea201c7aa60adf2ff11e67208427bdf642b37ef83a35f585324bfcd39347377e3dc937656a7e8278b2fcc04cd319c68cd647fdb32ae8aae491f5094636eedd061a3ec9e79ab001f3008d8d64a149768f6058f62a9ed0f5a0b8a37b29a413e4fa92621277a610b53793c3431ca457a92abf4f5976c72ee02f097a102955bdae98b29a16121c899fb3613be8e71b30ba7f", 0xd0}], 0x6, &(0x7f0000006040)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x18}}, {{&(0x7f0000006080)=@sco, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006100)="e4b08f40d127809ab59f9abc2e62d32b3b095e362a33db814f2679bdbef5ebfe3795fb2f49111e623597e89f709ca393b6cc81ffc5b330fbbf473571fcf0b1d37227a68ea79fb176d6a252561ee1848ccd8cc8327378a41d11a4f99f6cce6df78f05912191180db0abcc588094293f2087248ebffeb40e5c64d492ce55883e7b1bc49a5fec2ab9f1bb77704acb78e83c3ce4012dd7e05f67e5ce7adccd8eec675bcf7b0e3b34c79acb83e487", 0xac}], 0x1, &(0x7f0000006200)=[@timestamping={{0x14, 0x1, 0x25, 0xffffffe1}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @mark={{0x14, 0x1, 0x24, 0x80000000}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffe01}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x9d}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000008340)=[{&(0x7f00000062c0)="2228eac9aea9c4fd91533a4d13daba4805d95e86ec666a9764e71cc2ed7362662e03d2cc94b7c9c8960317e00d37a0be692c93b07cacc8e35ee3ff2760ac92190951018b846e71695d0d453f33677866a81d15ad80aeef92ab949c49a25b9c1ceea9ec73abbacffaeaae29cdb1ec14cc72e84076a6fda073c9a48c860c03647ecfdc4f9c45cb9d6a26be9fadeb2507e0582f1d512501b75e679cee8f77dcdd00bdd3c6239da0960cfa8f2c483508f070ebfe6a88782f2607fbcdd9ccf0dcf2709d6929787cae1f18f6d7829deb659284b8af9628a1e745dc565ea4100f849c7a20c1cbe4f5f649b1cd20c8445583c3a631c99fdd6e4d4ab417c834a13e40b1ffac44385387a56f9bc94bc4b258d1b801cb1006f1e4ed72ac9741542e4ea1671fe94f50eee7445c953635ddbd7a91ef8b0a42e8cd5ef6c9406ea7b84f74d17abd63c1d5be70cc063faa8cc42f31dbbcbc6ec700993e1f848386e7adf8a06e4f6082d9d794044a6fb69bbbe24e5473a661b2e08416d8579f808a2a80504e4ba2b4662e17a349d139a9d100cebf618d538af78d9b4488440332655607b0cc4d5a9fc9f79fb9f4b8b883e06762a2bf739b25352ed0b7d57113beb28836ccfaabde93c2421c4b0c05fcb2cf2d4151700ded96693dd6f7e6743e25a918689bab9c105fdc3944bf68c16e6a6a165d581f6be9700def17542370110e4c2c0cf2fe463f3a177b9517c6ab8a2fb644a01500a526807a8911c740ee003f16d886f879f39c3ce553c7cc1b469ec670785fba64a93d022dd80292b99fd64667f55815834d2f71f269736ce1aca313f29733fd4127aaa52f2a713330576b685878549fdeeb6fdfe55990af42021c15d6c034c0d35ab65539e15fc3fa6ee2d49eb87dd0c2b6d9d46585ac19cea11f3583a20b8e88ef0a0be0fadf945012b4988dd1272f6cf4a65cdcf8191fb2f9ad6040ab953a1744b403bcdea52067e44a63187cb104fe5b908acf21a17b72a56cfd6ddc56e7b80f77517c03b8c248ad78c5565cb44d55d48bbd72b8d91cc383df65e448c654c1b37d688ef98a69c02020d60759a6d434fd6ca644d313b5f4ba7d0b9d797541fbefb62b3881040d47ecb285fc901090f1f215c3eaa3028e766006f7169975725e0c7855eb7c7b69b36023f42514896e3e00245ec3f8bdf7880351a4672f3aad9947f3613a9247e2b92b61badc2738713ef32757e9687df8d89ff334b31c2bad7096ed3aefeb4a759db5afb3572bef82623b7aa0a489d04607560418097b75f862b142e4174d520a1097e28edc3cf2805f03ac6dcdb6b84f6056515f245100580a29b01523dc92573f377c3347eda435a967a536dc9373a96bd79ae61ffbca0578a4bd426a54387ad31226f728ed2da5335ac3de7f93a7019482574ac6241c15daa85f824a0dfd6160c6b544bbebf992a11c5247602eb37f2179a3003d6afb6548d022a1d5158be92608783094d4456fedd982796d55cc1113449e82b33de2819dde887f01c19ae803b486af107f35200e6e6c558e2f3be42b22cb8e0a826ca8da2771314ddb4ce0689a119dd0732239f3d8810addd0a90d8d445b17ff7c3c38176473a1e1fb30bee7d9df0a0d3915a4a00dd2d38db7b765bc3b7c202bb6e5532c9f3da779a61c89e6de9d6b0e6291f9459222354d8ab933b7b3abd5250f3a33a80aa8dc973ee9e8a7cbbeaad879f1de447a08956eb48bd55a5b4c53f37cae779060bcde183c576d184eab399f9dcb8dbc517922c7166d071cf347a999347bb5943e66a4d85f27f713491ae41bed53880981053b7b642daf5b0d27f6f0502611d7551f0e25054f1b636cdcbc7dee6ff9c1d85af1c37790fd8e9306e50ceabcfe7e652afe7d261815be8b0af4df678b3755289cfb38dadd5e6be2196af8d6d3f6d38cd6fb4e1899fc044bf8d3e7b057a1a546ceb6046190419ae5a6af1645b51d28aa03ba8be1def1f940ca58a70f0d2e2a2d285e45e38aa61fedd0f6a382ab73b11862be4f09206bc6df2fa234b525245350fe019f369ea58c3782049b490f2a4038f35dc7956d735f196e88fc5d817826d06192441537c1889a0072c70326627531b5f881b929288a090fa47fe3ff11b30a006068e8825ec41c66b5b415952d3eff35916f1a217e9ffe8124e68cb4dab941ab335a91af884e65a93f351b455eb2ba9729170ebb6de7d7406fe39485cf787c8cfca198afbbf2fe53fbb848f4e79e7e1bc445fcf2640fb48a2ed3398ff0584243aa922528ac9715d5d019fc7d65e0b4abe709353c3d242127d456f168741226d3362a0298ba75a84c363de316a071c8e8a4cb904ab74913153a835cb5a3f7ab24710f58f2f13597c37d968990aa0db3ac291fdfcc8e5aa59ce075d9a3bae21e6df1ee8bee4b8d926d3a24a15dff4cc5814cdceb17063f9dd55378be820302c143d02d71a2fbb7ba306d04399598dd9a71438e75d31e9b67a40dabdda8c76f480443af391fe663072a3b5b65362bb1f0b17a078572693d61887517450edac06034831c294dd9324ad3a63321c05de5621d4272437a57530c1081b826fa89d8ba5005dea3e316c8342b34eb920c152f345ba438f806c7099e37f29883d5b13818a1e3dbb3030e57575e24634eef242ebfe61c0aba1d3bf6b1faf1bd6d8486e7e6f0274b37e5974a4b1718247c0240ca3234f93c791dfb275265ca25acddd879ccb9ac1c5c8dd84a4ff92225405a340822aaa198276db17c3f8ca3e521c1e6d3a9aee404fd3d3871741095b749cf7747b819bc0a8788f297866555eb7c4203461b7c85ad6d2cb2ebe54dec982edbabad067ccfb10b629c3c8113d87d1167c0c506f9b727191bf30c6c5e489057505ae0d206534cd0a4e5c593a95ef080898a7baff250b0a52afea0c06624be266f4f13b3befc18899cadf2a0d2d004b599e62d47f56257aa0502f1547ed785de8870bb8db2d2bf08cb6e1fd8d8aa17eba3bf203095c48dbb57cae37053eb072db114b06da911fdfd32a20cd87b45b01829a865d9f341adb9426ba19ff12f0c03cb36417e10083606a4cc6f8bbbfbacaa4c7bbc562fd692eb340ff97a4d1d121a947b569490ffa80ec09d8dd47ecc5cb530b3764ccc3cc6c0d405c7520fa59f6287a29b7e90b71a403a6259984866861fbee29d1bef44bfa241fe9be3bca238021cb4cb2ec04715f72475c50020d0484dd1d356d1788b27a4fd9733ffffa9620ebc747372301996f3a77699a94cd321331233784ec4f4df3b1b317733cdcd004d80d650fcfbce3cc8ab699c7613dfe2412a72105683eb6dbb845468230dd70a9a4d76819f8a83d72bc9a16a96622ab42ea6f8b8bfd0620bdeee2f754a13330f4e1654b0d1aa9d49ff24952c6ce56b3116087274e5f1c53a4bd764ede07faf6670750e0b831c658527109678b121a956078da4f19284eeab191c6d009ac0a68eb9c07cb017fb67ce99b33ead306ce6a1e8cbcc93f8786cb3ac1d17f5ebf9e11a4bd95e735d68d6f7e4fccab6c143cc1224e96f898ba6dbeeffd885ae71b06de3895f8814d2142cbddc9d695000aee24f15da958085dadca4a3d06fc5bf234510a381daf5017310b3945679d6c0a2e4cb24f48f1d21563416d42b19eaa93e031df1ab59eb920ace7c672db3b8dd88b94a4351c6f2cc82a83c697a974fe962ab0dbeecd7798c2535f7cf57c0d57bfc8be9725a137d7b56b19df31fd50dc8dff282058886cbbf131d32afc3b3c21ea803b399d89204a2225b4273fdc5559390a392a1651b2533e1094ed6f8ca05c0b184640057a35500e674108a2902ebf789a788df774831a46444f677883c45d845d8913279e0ad45dc8823266397ae011c741453fc7c3a3d09756ae54f29f07031aaf944f43f38669e15903a4f9d69a7f150d0dd5b2aee9993dce293cb4711696d5d172f051cdf43a8a718f2ec97e39e1dc1fce391312a118583eb64415e44438b7ffa4156f826c23e3ad0879a1dcce665424652c6900daed97075503785b13310c423dbd34874dbd6c970be65c8977480c0bb66f81df5b21398a060df40976fbaaaf9df9143a9f2184cdaf4678bc0d4255e99a5e6ce85ad94eda54569b87e599c0026943801d48fb4f2594ee13be790eca9513470288fff715e23eedd9a3b687272e5bc147671a91e4fc4d32a60ed1297bc1eb277d942e084bd9fd92b94984d213dd52ed72f0802066f22e5a6fe86590c5526a88629b257e3258847bb9003936c4d8a1cc571612b0243c141493c0a7020971a6f52ffc354cc233ca0d1c74f8b5147575d814cbd73873ff6ff00cbe2d110fb17d8abb534daab7740cb319ac85085bea9c7b02529a27e3830087c36493d24a6cad4a0c9558e98351ecc5150df0fb377662fc24f1bb489c86f4ed6e6f762a1f34e8364e71a890794a60e27b6c94557cfd695fc78a3cf8eb83c71d0a4ffbab4cb4e7bba86441c02cbe1316e3e4b63b9f0838e3504f0dbe2abc2d05e5462bc5db9f1d1ed2494df5d305a860199196f4936eca3fa62f411a8adc89e852c839e148031d2938d0397df161e1c9400dcea9e812e79c5f455999121b0bfaf395d7740a4435eb4a3ee1b20391fe698691c2f5dc0efff3b8accd4b32599860d11239437ffefef38eaa44335511ab90b4efdbcf484977212a8ffa9c8dcae66a3bcbfd832d926cfa5b3f021b77eb67e3c46a428aaa22d90b858fb1063ce9da463df9be4c49912a644ea623217e81e7f326da77be71deabf13d830f4a3296f6d6abbf8d0608355c15ab0e9af906c5b3b95e74f64c0b82253a0432bc3301f8792a50a54e70653b367c6268a28537a1c7ecf14e78b39ae0ca473e0488256d3527c4f3a24b1a5ff43491e43b3ca4c57fcf956108872818195c51a62006aa9cdeec04f980e9930049de4c0ef1408aa480ea7df1d9b3d480e60c2153c7f1be4ba0b86a754d50149372715474aa1e98636671a772d92fa7866387c5f8832a20e798700217ff909d9aef45f28ca8a3e33d7147620487996061cbb0365a994c392fa24451af961957812370e4b5588836768b6dafb3c09e1150707feffaeb6f691d9635d7cc39fb07dd14bb4ba6ab0de36ec165934677308324eb6d718a5166576d92968bc3cddc812028d3dbed72dfc18e0ca4035b9464918b7e0d70e172370ee866c5c0678b9605fd791ce09d41ed73a71ebb82c6d5ad9a5b01a638df0c80861838298b519510b320482ac6ec96fe1b874a0a4cc2e4ad7290c2f05993af73d92bca6d2df4e732965d005f9ad35eb07ff4fdc157619de6568069a995d63bfa3c0e6badf4bdfd84f0897891a495a5982e7c6eb7ac4f3b88ef2ccc65c1a382683954907c56fd9eaf0b36a3825a1f36790d36900899a3bef4240c652efc21cdc32ecfb759aa2a3e78e1737ee4e91684173dab116b846f6e30016a68cfc03a1ee1aa51727651458b44a855965bca1eecad730b0bffcc699f3fc706cd0863f863f6404cf72236b58fbaa07213eeec1bce94bb6919234b7b9f9d24daa749fe6be80f5d8c7466dfdf49178233e87868bfe39daefa504a8a2aba063028d67492704e582a6d8154f97c8521f73b8565f4eef23e0f08003b4065c9439291cc396859ebd130b28e20a5fc5ffaa5a7ecd89b582e987a9eef73bba2fb233e28824a53cd8f81c2786e28120cb00e4b91c6e61c0e78c131ddd6589f3326a12fe143bfdfb92ddaf553a423bb5e9a45e8e3516e49fcd0272db91425ed6f84b6c72482f5388a15e115ec1295022a9d41f47ddab12ded625867afba254b73de1309c77fa048b1184252ee6", 0x1000}, {&(0x7f00000072c0)}, {&(0x7f0000007300)="373ebbd346a48a75510c329f93a7522cb0bdd5c545d491d851b7b1e17cbfa3ccab64ccf850c9c4723b1845926c", 0x2d}, {&(0x7f0000007340)="c7c225a39856807b46dbd7ad2e184f71e584b9c0f46f41e75e8fa242a906d6a7802b3d863441f5cbb45202816b425b1d354d4121b4d8e21b6ebc324ab60ad0846d298f6e0465559ab91ae8c0f1e325a73bb65a826db29ad6f3d56917c4a60f17623b56dba1d9f3d80d154afeb3748f120a73562d7a5ab0338d133e0eef7ba4a694d480fc5289f0ee97a0761aa3453e9c1781c1aac66a749524f6de0f69ffc0cd6abd3bb01f960a942f816422ac4921b13c7842dd8973a85d603ad79f6a000f3d26e27708769e7ae66d35daee34908de9c72592435fe4936beb1a60fcb2c6aaeaf9fe9ad60b6c2820be59d2a2797d970697e9e377b8ad64644252414b1c6b02e392fd538e152cfbb06eb1b2e83654720539b611b60cd9ca5b2d5c931da3121966187180bc61e289e7ff85f4b69a5d515b01e6e7df74fe19257c734fc81a5f3ecb8a05d380a8f33ce6eae0e09da2b1b5d8a6ab18512beeb00b2b4c4f9f79eab57251b0554040eea8739d3a42660c561e3255e9c1e1dadbb3e27d12beeda954d892a072bd7e315fdc560ba362d6d7419a185eea33ceeb756ae06e9a547c77387e67b9da174749847d7fbe06013ed468aa1b4c3747f133091eb48327bd1f525f7c0439611d7eb58190d0e342bbf76a6ae5c859954438f003b298c3d2bfcd209ea28cfe02228dd63c94e9a52d5515e55624382010e339a30ddf04b201b7a89ac5ea0a4fc73c6b1816bec3256ba364f4f08b4ac13d1032653bb376ac10066a2617840e7d34ba9dc790fff841641ba1399c3f51a4d345c660ec57dbf33225875ded8a0118d7ab2cb305d76add2d54cb88be2bea3056fe24496c6678ff2f734d8190b37c9bcb4fb1a7ab69f6e603f97db8c95c9af60b704aaf82d50602407cec6de3fd9f5e9370f623cfa767357f942a2f05710ddfe1947156137a4a123ded19e0a8c60842ed593833400f24fa575a46609cdfb91e145c85f9e35a7154271ec5e4e3800c56a213e9ca26e12cc9ce257193e2728777908e98d965b51de42251ab730f107a9cd99196c1e0f149383aec62125f3bb90dc0ade9f84ad2b8df833cbe14a5248ef65bc002d0ada20e85162464f1bc76278291a4c6dec1741efdfd0b0d64032db22c394686d1e02120ab86ff3afab3014b340f7819815afbea12a160cd67e486384f3eaa5033890c1634c5d49e05f5f422ebfc4e63d9186a19bd1f7971378aa1bee884e51451451dd429b117aaa1f496ed32ac825b8a710696537a209d8fd12f740c76c7d22d3969d58cf7f6174abe3eff854572e5f43cf523db8548af896ed0fc13b3623c6593fa652bf3db90cb96806db45a3e8426e44c3b7049f6d431150e316974559d73a157f8ab978e2b1c0316d6f61883edc47e095f3e88bbcfc56b7412fa340ec0f7b5bcc0c147f828ec0e286f65cfa87d0b2bc160e48cb6639a91c6f5942507f66e76c990bee0c11127bec170c63d4cf30bee622635433576c46dc0af88a0105a476e915761b9f576784acc8747707137898378e5f36a531fd99d40004e579d4e561644a01867b645238b1ca64832784d5e128dbf17ec6d6f63efff44e92867667a97db908560836e62c3d463fcf8b64b4f04bbcae52f1c3dc125031422ed4a49eb8a6a47fb6f1c5a39ce22d348513d28be85145d07b17f5304d5c057d6307226eacca7d3503050d06db558015211d7aca9cc0bf9959e415c217f121c39030ce63090db323e6ac7af9e8db0043cdabe051f49a85a382784fb0e19a27469660ea6bd6be63fded3b2ebd4367854f48ea665d37200cefeaf60d9d0b3166a5cbe07dbbe1a4fbcb73fd316007a4ae509f1ab01dac8e71eb7dca6a5f5a7cb1812d926161aed1a2cf45bb4c95937f537401738e9c0fd8c767ab264688589c46861d80632187bccb020dfcc667e14564dc0fb40969828ce23245526cbeb481a1302093548fb012113d53b515f2cd91782d68eee4627efb6d98d906ee7729075019c437f882b71256650e46a17f1c37137249a07cca4e7757de85c3c833ec0067111f2a270b1cb9b4922db508549f9f7ab5324944c3f55e564f2c9a1885a0f744185382629f1c7a134abac48e351b76d45c8bb5f975836262fad5f085680cd01bc7b03acec3f881e34522f3eceba4c1928badc4b03e3b38fc1c427823c5aa5328b0756cb0cf8cdd82cc2d93f2c6f5120cac59b422dc00a56c006ae13042c0eabb4595f8e1fa232c192b54608c2a90b7dc13096c7eb94244c59b4b02b7934cd49ef6c4fd7309f7cbe4ebd72da5176aef829370956125edadcb13dd64367f7450aeb73c7f2ae0c62b88d04e6674e8aadb8e0504efc40375d2757560bb115cdec899f22e6e836b5b94618938207e6323e17bc720e7a090ba35718d1a40443b431c3bf8fc2e85de2e8888de59fa2600f5b674fa48a3f00833e8ab235904bb375483ee1d4bb8a0fe41be56bc47537044b2f7270393c83752dac918664c7ea0a0855cb8f3213054b21c27e229ec9ba4225a3a0490db82c6b7153e525e6d18243a47aa4ef592c0236cf8a86dff115f7eff1b3a6859ddf0275d804c76dca033660ab826d59ced18173bd9b3d942acd5db191dd13e88f1864ad684b8dfab93a4216dc4b80e7283f3d85577a642b2d669b00b0ad223e7e12b5aba3a04bbcfd1e4bab048d1855e73ee5142cad9693f010ed44e1422a14dc1fc9cc77f380706aaa8c5cf655c5cbba7765172e52891bb20bd50b4dc224cab75bd0a933422fc0caf7eb8d6ff6a6789578409284d85477f89e0a83580a7f84bbcf588186b10bace30b6a8ea82a6e6958d9d33b02a55260ed86ef778d8ccb146fc201b2fe9af472fc325da994c1310fb4b8c4afe75213e16bcededcce7a8df0293adfa932963f677eda4df8022c14b23cb029dd370c9c08013656cc3d9b26f713ee78418bb5ee78a9939e52fe65f42cbec408f43c7938721a13e6881819c736152d68d9a9e4caeaf33324de7f939a8eeb3b04a336877fdf29f809fc63f5733ac373432038e63c2952afa3f5a5e33929944a1ead797bcc0d963c4bbbfc2457def02a6ca51e826e9d4204151a528df784736a3e6cff398636b6726c35687316f6618162f93b7aac3ecbde8509d897b291198e8c6f25f190ed33a548623b6720dd82eb8a9f6c6089914e3c0502c962f5f34cad7e65e33e3e10934a5af43b600abfb755190a9829fca86c9f9cbc64172ceefb58f8b76b45b287f503198fe7ab7ea31d2ec1cf533e6ae5867012920e92391cb21198c192bb242406213a5d54697bb93c7bb0ad1cc2bfd2994de9cc157b7dfab39efd5d5c7020b3eee097ea8171d62d68423936a0ce009d3a041eefdde4a8fa491a79899c280768b4ad7549811fdda84617a775f71cac65b1ac3bad7707e4cc67c5aa12abbfc62e3e499f94a84c69d70997bff7b240e89711cd9df73d697e26af729d29405c17996b9fb5a6f76675869cd818a6b78c334070f8884881e85b3e369f07ba74a0a6d9a567de35b7fbd531a3ce39301070ae8e0c7f504def54bc081c67ffb74d03f479a23b80e744f476d212157af65863afa8ba1fa75049002cc5361c6c485d2245afb342aae97f88e1e349cb012cf99b067d7fe19088868e24131b5dc146a8a7b5638391f36a9d8e16f4ec0a931e729e68073071afe387c2d2d4920fb7b3526e23ac5889c47758e08fecbdb550fcf851e31ce64b8a2cabb2808be62cf12088b4b06c6c18e1ed696ad4d13428c4ac1fdc8f854301a6777596d2195870f5de829424ae9c087878499efff8bae00735c79a386fc2dc9c9dfa9c78279b128bfc70ebb202aaf855b510049f9354184c470e0b460bcc8f7d343991f461c2a17c4e2d376b5c3879f5eb3ef4231eb279bf40a0b1c9f888485d8319f0256a7bc27cb3abdc7e45ca573a4d714732ad32880c1e3abba1367eb855d3743c78ea3c5081792fdf9a661a26550fc460f78d469916a8c20960118d384b83803119fb72d63b271e8a893923c843cbefa66ba7ffa6fd2ea73139039f8993bccd938262a16a6f765cb1aefb528a66ea4491828929ac1a4fdd4e16904cf546288e84ce8a45b66cbc42aad9d81fffda72d829569dbaa7fb445ef39936dc7eabf07fa38786e3cdea5667440196a77e5efae1f14f0f95081d11a14166befb86d48df4c699b296b83d64a6e84e265059c61d0fd1cae06ad4482cca7188ec07c9e73399b8ffe9adcda2e8701574fab941d9fe5417393b796917746bda9d1c0974276cf322c18be45c8b6bff66df074228dd05d083c72e013aba2ef394739012684e77b7ef6de21fd0b24d7b51540cd6335e4d39eac215c355f73805631f0a5fa36fd6f81f9f2d2c4e548b4868e305796b6e027e5563bdc9ac064b98cc1896b87315331facae880eff5e4a329cabdc3f1f71d8b1446694781b61c8da0c59681bfadbafea7056b8a696f4787223fdcad2f6dec5b17068185646e26657482858bab0876100fd3d72fb7ceea3ec14561dc7d0e8497f9697739076eb5df4cf4b32085661e5bdb3c5e11f4cbc6f7fc4eebf47bffd2c6e83b35667e6b535b689043471da8672d08f5db00c5bf5d1e17bddf405e9b6519e6d8a3412717ac2c5ff9bb7fc5fb94f94273091ab6e4899089088392481ed710af21a7c6beb92530538d6a1e4dec5d7a248ab62408d372a19a6961e88681d5e7c5783c2fa6c18c159c25d209c536898df2d4b84b63fa3256f70bf5884548fadca1c3d52a6ec8ef53c11616c4ed6ef88f3a3c0de80465fb2271611e3edf3c1867a5159e1101b1e9805d3d2299495f3e514292ea2e5f99490a77472748f700a9f10e2fe9d52bc3eb782d3348b031e7a5ef7ca6bdaef926e01f0e1824b20fd7b77076ca43d18f8aa95d52617f6a75b8db5dd01f838de00ed480ea2cb9ebd6e40a5773f3def8e399c99bd96543ab48ee88cb13c0ef90dd4a2f7e08f6224344c4d5e9b272c175808a054c47bb2b972b1d936f425f36e01fdc8e106c69642355a5a9a40e336c59ac880e9db6f4e84bff80fe137a4a4b035a950383b535e26fbabfcd4a96d29153789ba029ca2939ee8709bb7177b40318f9c5588d7cdbd16627552bdaf1969c4eecdb30f000c8dc8ccacc182d08ca721ae31588e5b1b19a4942bdcc00bbad2c2193a7553469ba6244b3c6a7876e83479b2c36999ea5ae0a85df3e22ccfd63ff1f7dd319af3c77fd118fe4603bfb00f2beca647872065d9aef77220f8b45a883586f5dd06cd08773bbf35319b24b6f4b23c7742dd318102561518333ef9439670543fc9c754680ae698981e2b16cef8e48582b20ebcbb612631925399fc1a556440f03afa4009e81cd4bcae4d5bd999279346ac8d681b987a8a5bfb58cc8b9884e5ec5abcb152f99e99973f184e06c55511573800adc92e9644bd257d65ebfa0c97eade06c23f88d000811dcd64061d36712d5a9b7d799699879ec13924a1b052a3095e1a887285b9761bc4e6e4e0aa14333667bc9f8845b14ab91dcc74ea09130d41855dc632bcfe835a027f09b61d134f50658ff9ddb92f8c699be7d0f9ab2ee5cb84c25b477a7cfcc68cc15a1b5bf5319b02a10ab31f0426a8ac111ffc02b5187a9b839981d22785e7fa149c7439087be6a7051ddfec652e81bcaced7d9804ce5b1048b104aa97ec09fd476728e67b6ae9d0713bc7dd9956a2372e0d146c4ba0c43934e1f1476544abf14b6468f444f6aef12adcc354081a5033b5b9ff16b2203edc81b380113fd51711d85ac5c47784d234695e7cf0b60cd93db7588cf5538fadf0f6960204e2242c49d7ba73e408", 0x1000}], 0x4}}, {{&(0x7f0000008380)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f00000096c0)=[{&(0x7f0000008400)="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", 0x1000}, {&(0x7f0000009400)="aa4170c3793973b25800ea5a3b8621f4b2d93e5fe41fb1a7a6c8f54c862a98990be7c6fa37cda1d629d7851856751b18554505c7b3c35672614d05ea6d25364df16f1e5b1655ef0a59c2eba094741c2db1568760e758c1e893c637854ea2b28bea2cceb37c93cf683346e4158ad386bc3a5b16b5ed67357695918442fbda3efef5f40a3684b246534e3c8bc82c5d10f4d778c6d14d1ead4a79b9f3bf50df4800ecdfef8f53fa4bd6d0b5b218663de0f16dbe699ed7f733e311e928644a4012a1e4b645fb939d0740679cf979251d336b7a66427b80b8efe9d6bfdedf3f1fa59eadd6d9ff9e775dae0fd2fc725cf28d495ed4", 0xf2}, {&(0x7f0000009500)="39be23d15f5b0df3f87db323010cc28b84a0d3d7746126796a33d5e279c761edc98d0534c76d4989d9f680d2378b45a48ca99b4fc467fa1660d24eb131235366259e5f42eff95a187faeab200338982d25175238a82a43598983f03683d66c9b01e5085ebe13883d240128dd35cce25e938096588b68c1b878a970f4241a7b56b158ddcdc1621e683879782ef86a5fb18a815d49a8942bc079ef8e562943bfc18c9a2af35a505bc9d3e96df067520316af809b8e6435066a74e0d85d9942ca5db3b4015753a217747afeec207f858e09c02e1a6ec075e2a4690ee9ed5d8d8b7897746348a105becf86eb0743c335c8eab9c7eadbd8", 0xf5}, {&(0x7f0000009600)="104cb4ae67cac835a4fb6feef86fb2f24c644b0a85ab318ad7b8822fb6a970a319ac415cba46030cec7bc20dc9d3543950babb5afd17a248b32d445cc4c0b45a7bb9992d85fb91a42fe2414becf27596e4c072cdb8d819cf4a4c28a3cfd263799c8a38787d54d0b0555b3267812d9ddc727b2e32a6464fa60eb33e0849184f0e5f18b4011b95b0010f3b275e4dd8efec5012b557ba1f5248f788", 0x9a}], 0x4, &(0x7f0000009700)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xffffffff}}, @timestamping={{0x14, 0x1, 0x25, 0xcddc}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x90}}, {{&(0x7f00000097c0)=@nl=@unspec, 0x80, &(0x7f0000009b00)=[{&(0x7f0000009840)="971361c6e984a81d00cb042b4dbf5d2d1be8473c682ceafb373948373472f53f36c4acf30371bde36704def893123ebfebc39fd36a321cdf7bc2800a9483e6980341a4ce97c751e21138949df61ec2817acb25a110d5efd33ed20973248228bdbbca6b581af4b1b5ba90f8a2b5d9a0142de25e0742f8726dbb34219c79975b379d03033ba4ffd4ff1967700685990802ddf113485e4e67242e1e46caf9ce528d6d1e88ffddc65bf64fad3a8540e055512833a7c8a8a6080f475da7f90834183314e8057692a22805dfebeb8c60393dabaa8bebc648ef4f", 0xd7}, {&(0x7f0000009940)="e77b0e8577e657cb70aeadf337412f71d2f6cced433a5a358ad593eb8bd4e7fd63d4e1215bfab9f5b200683909d00ddfd0905a26cddc6df09fca88a2fd518ef4f01fa6a371b60ae9a9aa5ad16464746631b396e6fc769c806c411fc4eaac71bd2e22b7559fd8e9df1eef2f3305054d6b2ad20eaa32673392a6d9d4023c32ba6ed2d66853d27783d21fc7b88550eec05f518e012d4356d82a8be13abe5dc09fa7ed852e2d711577758464c5127f5e75fef757656351232178dc7aad3e1020b3c7ce3bcf", 0xc3}, {&(0x7f0000009a40)="71ccea", 0x3}, {&(0x7f0000009a80)="9acc6f38a4f1fb84a60b109dd4316f80df0838ab6880884ccdd01335fc7b1de2f6c2cba15bbf9c50e7467871adc52bec1de19e0c71e71e056920ecf578dd3bded310316c7cbf94ddcfc30ffb9a4311268f", 0x51}], 0x4, &(0x7f0000009b40)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xb44}}, @txtime={{0x18, 0x1, 0x3d, 0xfd}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x1000}}, @mark={{0x14, 0x1, 0x24, 0x29}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3504}}], 0xd8}}], 0xa, 0x20000000) sendmmsg$nfc_llcp(r7, &(0x7f0000004a00)=[{&(0x7f0000000080)={0x27, 0x1, 0x1, 0x0, 0x5, 0x55, "a86d9a33dba2ab2cf21d02dc46fda8826b57ab85b49afe7bcc7538669f270551611a21814e9542d054c49f40f09a59822b95ebf47d521f0d870321fa235b5f", 0x37}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000100)="faf650c5f792db50e3394f5a247cdb10cb3165ea9373a86be2a1d716d6bb10092a8573a116abe08d3edd17d1cd0c22a6f83d4df7f1b98531300b130248935250984f78917a89bfd57c751c6bad27edccfb570992a3a5e069ce03322936c2d6749f4839a919c63862be2991826920ebf5e4f7dd52ffd1b8c3", 0x78}, {0xfffffffffffffffd}, {&(0x7f00000001c0)="3b8b7e69063a4324f45f46a6c0b6baf0f86a03324a5d7bbe4e5865bd94aed70bffef4f556d0f668439a9486bc17be27f4dd14f4cd220", 0x36}, {&(0x7f0000000200)="1b0b7fc85c4e6eea6dacc9c226c700a1c01afeb96483ca4297", 0x19}], 0x4, 0x0, 0x0, 0x8044}, {&(0x7f0000000280)={0x27, 0x1, 0x2, 0x2, 0x4, 0xf7, "7b2e178155953d21385787745726edd11dc56d59dacecfc956482ea610641b5a4904d6850e6903705f53e950468c701a4b7a83a800ce34ad4f1ba9172d11b5", 0xd}, 0x60, &(0x7f0000000380)=[{&(0x7f0000000300)="c9bd705478d7e8b843410e41355a259b78d407223c08462e918a17eeafb031ba5ee1304d3a389a800a2c5b82f832cc7562df1f1fd2be8b40c09c91bfa58cdb2b48e80fc88c2988951d7e0d1d6aa290a572f8a6f0f5f11e61", 0x58}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="1e00008c6842b67051c6091f11f100010000801cb342e814279e46bc2b19736c0000000000000000"], 0x28, 0x4010}, {&(0x7f0000000400)={0x27, 0x1, 0x2, 0xa, 0x2, 0x4, "8691d33c60ed3c6a0e83f432e60faba3a080ae4662095ddf3c5c9cda5b99915f0500f40e8b028f7d49b88a5cb715cd71d9b385519519b559c4d04cbd75082a", 0xd}, 0x60, &(0x7f0000000480), 0x0, &(0x7f00000004c0)={0x18, 0x88, 0x80, "ffbb056e9ed6db"}, 0x18, 0x4005}, {&(0x7f0000000500)={0x27, 0x1, 0x1, 0x7, 0x4, 0x4b, "56c63d65ac7da66d8b0ebfac5eafd55c0dccbf37b8e2d9d21c016d40f8973c8bdeb0d05db6b91a2120fcb87b6c6a0e890e8546353ad1c0f86af39b3603da48", 0xb}, 0x60, &(0x7f0000004880)=[{&(0x7f0000000580)="485d4874116b27f7c8002cd852fb2ed2a9c57e8ac9b229e1e7ca58c64cdd17b341656f7fa4b33c617eafb40e5e7e10592f366b7224eb93fbf5a440190bcb7d84ccaeb74c8ed1c68232e2cc10ae99ca51e2d2ba2eab470986255cb82705a1b52989bbf40013fa224bc0a23bc8c8bab71f6029b668e3d82d0dda3a3895df1753844f9e117b115b81f1ccd9035c8ebc2acdcd0a36173d5b04dcf814c5c9814350d2e0c82e16d8a38628509274d991a370cbb34e7a2f26627769981934ff6d945ffab67b57935a57957112fc994f85b81f", 0xcf}, {&(0x7f0000000680)="2e41daea85d11ad63ba2908c", 0xc}, {&(0x7f00000006c0)="e15080cdedf106b8db5493f6281ef484b299a0142673f5e66c8b1fda9a41d66f9e5a52724586b6bb935ce24564ff7e8dd49e0810a22acc83a32c75c161c4bbfb315b9c08d7cf93847770cabef2cd0ca55fc7cdd80df2b618e57603c92bb4e76e4beaad5a39123142b2d0598c7755b13bbe55028890b5cfd1b935f687bdb3bbc6486530cc0dc5cda4a884a1df723d59e24f6fafd3724788a354426b80bc2b5adbfc41a20c8f78643f8dc0c9691b7840c0baad946f4342919c6f7a840bd51f342aad4792b318b79d6e5819c6be90ce52625d12e7a1345a9bf6c26c285fe33889810d134a7be4d780940ecae902df5c3a00139726daa19755411acee08e89dbae7c8cc734b078c1603e5ce327cd759b014fc05f193826742e3163c7e79ea780236adc53ecae7a4e2cd7fb88d9f2643671b27f50b119afaa33336201e7f105115e2e6230abd5cfdae3af5d7648772fa2bc5238bd394cd935854d9e9990c6776e3a76b4e9d5531f432d87d9dde1f66561b7c2b791d3b219c1d917c219153938469e0e8332676db0877dcffd9187f1b5905c8145d22fe3f6efad97fc6ed07ff7267ebf52cf146210d4c5385863a0e991155b91466f668e9f8b6e097fa6cb94e7a044ef78063c6635c675736980281ed5260206e4dcf2dabc9fddfa27801f6773b9580e565e26e2c47f1b3d318a34e2170299b23776f723a9f1b2bacca4aa015663acd8118ea8815c93642f45775c9db956a8b8b2a3058fb455b9750326656a1d477cca7dd737bcbf4fc4c0a63d598a0e723472e40b794f26e4e7460cfaf56d515eeced0912aa08ae21bd2fcdb286a011799e6a5ca30a965aa0f5b9eb0007d5cd16b99ea3b98a263ee0ee61a13290b9e56bf2ed0f54fdfcc715299912f8b87b373bd0561c0a041938cf7c6c73a55f7939b7d372ac8b420a987c0b21fc7353e9b5718b8edce1db07b28a732508c72dc24c03cbde8620a72155c6edaaaf5b2ccc9d7984a77bf4c99fa0d1ce21d9d93343ea99dc02457a8fcc1b04972ea85f07e6d190ed4a6c15a8009f8a43857ec85f92a4cd9ba77e063199294c236f809d0bf10e71de95f4da82869c0e31407a960ec57997246686a6fdecc3ed30d3a9c98232bced8156ff45571d4752c4118ec9e5f53970aadadd65796b175a45862dce9d3cc298f441852e865d27a678f610f5fdd4ca8b5fff842fed4ca00362d7fead400f7bbff52a3290538357badf519c12cd7c71ce657afdbcf2b19a6c12512989d0373a09d6ce40fc03774bf3ec2521ecea1cb1a9ee4fa6ce23b3c46c03de6d5b96648a97e636a3586112e47b2c689744ea828b72c4c44c152eb53c38d712bf988ea531877a80c75c73c764834ec6889052922d553b3b384fa6e3617ae9903aee136c8a88a75f34ace83f5398d495c03051bd762d12331d9cf89fef4c2240f44f4857b8238ded779269416def847bd221869c06690224045b6822120b17b0e6462af566bd869d6dc20c33b238609954d2e75758bff46632f11f14bc244ceb91ae3159af927e013803473deb3398771161b0b53f5c4a2cb77c52304fd960459abaf654387764718e2db149df0433a74e5b4bfa662477a8ce372008d9102fe378027debc4ed99e3523579b1005f2db88f8213dfaa6e7bbad9ba4b295c323af82017593c7a9e96f76251d7d2d4829cd090f4fba7de280143daaeeebbb2da3417689e1ab7984511677ed63b6c952a9a79444f52731123748ad4c4583adc8e1c61bf410b8acdfdab58463c68dfb2dee65d3599684c245dfb54eb76b680bc5ebad0081319072e02bcee14f8a3ab2a63722a072212945b8301130d1fb4bf085a9a33d7ffed24158a107d19cefb09f3e02cf18a1a89148e42bfcb17fd8e2738496709f95bb9b9e8460a617cdbf2be9e00aacab4f140d6264a3afd076a9c70890fa318141c53be261df13f063a03ef3e8019dadba8806feb5cdeea178c1a753710d8dc71d18d08e8e77a77ed2555685a9d22bead5df8b75b6ec87648cba1910b46e65a862dbfd6789eb001e9601772cfd4294aee1deb24c8d99e1b274f9d77d637599a7ed1047766d45334d32e324675912bd12a361b8c85febf0f247087d6d9a77cc30215878c7ce7f1b586d83ca42ec9b33e4da95dbd33bc4d522669f02d4bb5bd54b8cbfef2e30a949ead4c889bfbe9c75215f296a57af2c7080442aee0e4017631c396c8431cd504c87081e61842572023c329911a7a51c649cdbfb15c83dd7066e09d87149d36a2f378003de2c00ddf27394a182fe7fa7927fd747be10bc0409f1afc48f8fab338b19070ab0a5f0e8a76399bb959272942f69a6e5d16fa56310021069ee72d71f94bad24c0cdae98aa2daf5928e5c7dd4ead690c39118da689b46ddeb6a749da70007a8f088dc4a4bdf7bc36e2fe32c3cb687d3b91664c2f1ac305e571249b2c4b2c49d8997d7c09dea8f5c9cc6a9bde7c216bf4360b56a574a4d3a721df7a1fe111449d22883506600c4615f531faf8a1cb6fd20198d668c1d355a7e6d75bc9b4b0a4fd3cc4afe8864e48b473dc1be54d6e4d9c073b75300030f030a92feb8b5945df40af430b7e7bba80150ad966905fd88dc9bbc3a75fb9e064cfb35f1826a90c86359f643b6a3aa60048e9ab71988b8e6a2e80fa417adee73a53524732a3e88e20a120a5457eea48c22c91a47cfbc746d04430b365fa41627626bfcfe437a75bc5967751f62648bb1bab1a2d2aec3d11493b4cf81715a1a3886912102bd13eca885bcbd71237713da6adb5ddf184d8776a1700929c68bcd1140ff5091b2402d1a2812acfe7660af66c86555d80791762b9634ed18e55e6507982d1b45215566a47c15d90a979642102cb5e7c4e429529dde52f2dce1c61e63a05ec6dd0abf98a2c8645d06d00b3aff141cbaeb1f9e5db00427512fb098205204c2bd9b06e1a219d80e27dcda1012b660cbc2f2dab9a7eb6661688eb88427dd007a187c05846e6b0c96de98c5a9d068ac18de61b6678d0767662ea1af8bef272fe3bcdb5063739daf3c97be308ccf3d9d1f9cc39f9acedd1ce8204a6bbafaddf8a6fad7980c438c7b75d720b861d058b07413a20aa81741b77f2fa2e678d2858a2bfb864cce0b511861e0c05f63cdbeea198f90aa5f83c3f033dd79852d78b3aefa6af912a3568e816215fa027def66dce691c335e1b9d3f0097242518662bfc0b6e82cf7ac5c4877931fc69388296a9a2689992a0c3bf7680d2ea37332ed100b873a857be430fb8e672f3d28b141d1d1c041e309b1377c6bded910088c3b895636566dbfc262eb499bff21cdab178cfecb7c6b82d8f8616d38b39234245d5d287ec364e0ebddf1bd8ef4c8f4b958893c5399c7f6224b5b9b26244524d2df3ae7099e8b0cf161ccdb23a11d3a04607a7e5da56b3037585d5e22f3eabe438bd238300e458933e8b2d80118d83217630c3e963d63ed9595101837a04d1c46681d43f675960cab607aabadb2d65680e8d71424d3150f05a4ae492805f87e3dd772e40e8ca9df33318de5fa98255829b99b8cc9322ab587006ac18ca8659e189541c2c9e4d54dbb9e033b7518d4b6dd381d61638986e0c8c0e00d37148110bdc0bffbbb2946ad06a4b1a4258e522a971d47fb696642c2f36ad27b8780e5b8e5d292d12262043336cb6f8f18dd4f80a7e303feac0e6e0f25fdf92026a4e48022a2bfaa1a10adc0e97d747736435b2876347a131043a78e4379ac44b06bd68f031cf8e7f33094779ec513cfe82cf4405fd1e357a1e4be296ab165e43c5361b55a56654d2bf8bc4cd241205b860fce0ad0f9fc9e0b32d90f211f4f24309fd16c59f46376470242e84c00a1a6e6d065e6fcbf042612583bfd89a2c7d0da5f526235b808bac1003378829353ead0e636854d7b748280c22c449e004e660644f3e05307a2427790da36f9038bd098bd50c77e7145c5d67bff7d54fd45826b280f5d8962c2496cf9d654fc29e951ee0773e4ee6caad98b5bd39630caa4f571af138f935abc32565278e62971fc4481818363a84caf7962f597e5ed0acb68f15b3ec5e357a3bad6c8f61a5b7e658c3ffd486ca98d4ce633a33ab9fce0d571a5d9c68e059640014d95cf9bbf4f080373fd8497d0e4feb929e64a55af0b20e2a90835708be93819be0fa4808c45fb01e35e111cdcd75530b9977b854543ae691f1843e2583e126b616023b4dd22dcce1909948ab4e330c7101f086533a79bc7db3bf548c637960db4ad653d6f568dfb81f78966c2b02656603c406ad0dff186decba48a012fb3b480d65b502d40e84f8eee771b435f36387fdb8e6fcc092bb380d5d9972f8bb53c3b7c789aeddfa8f335417e90366076f71c71f8dc09aa630157d675a1cc5150a966252b06c7ceb09f8da6f74d393ed775747107fff6844378ecf72fabf8ea1f796e38334383f0464081d6121c0e00c917445db9beeb3b7baca0c11df63d6988f80f7a50416ebe850b0ff7f46d9b5d81a9679068b2f691ba8f9469b66a7a63b6112b2e1971111e8a39bfe888dd538fd7d4181c0eca7e857621b6d7ee43bf8c816f41675864f2b9bad4bc6a40ba26d25132bf08fe673e79678d29ef8897a7adcb3407a486972a477783f4cf7c552aa98f37f272d6cfeed54aba4ef3acd3cd37fd524f1c7922abf12b7796acc67573fdcdbee769d57c7f7c6518ef504ac11fb6c58d4ab2c3da606db00283f6ccc64633b1d794777a023da5b0734297b3b4483f2b48074ffa7b6f5d8543e79e5bc32d40d3e17b8269b9170634b6d481874a44eb714f164ea801037264dc364dce9e1d4eaff5e55da59840d972b1688123ab7ed04a36011aa2b5e8c48d69a414a5fc62d8330453d310811c03b406aa137797b8579fd80bd0869234e2d64c1127cd5eb729ed2906b314067bec778b94febe7c35073abead1e366a48e411b62eff4487d0fc62b5028c115545d83b50be72f8565076d39ec87e94bda6368cdb7aae87598c9666f51a41fa35925b2a109c2a4ff83e52c33d4796f35315e9e73e18600079bb1278b6e9caa1ce665a6a3a9fda8f2eb396692f2f0b2ea2af4c3a7e2273eb0fb4407dd5ac4317f7820c358b4e893f830dec31668509a4d958bba1427acbfe86647e859b7457aacb5b50e4640f8c286ce2d0f564b7c6e29709ff55b3a54bacca998b13e12a94ae740a3f35e5b20fd4fe19d28aeb626de89377f9cca802d7116a0bf5c766a7f9e6ac504bd5e53029c6724db38199397ee9d85fcc9341ada150a0c69fcd045913d08d26786bc33330d3b638d6934b514a0697f6c22cf951b70abc8d0e1e8f0c66dd1195c480b2773ce571f159f4723f52cd7003dae34b48b2e083a3d2204b3f31219b4f60c621352118f1cd42b7822333b31b442c94ea092507a3781636eb59566161e89c1b9e05f6a3c0064c71ca1e422fa488113f1694d094b5f104c918281d725d2c06d9646dbb1b82ad8f74858a22da423ef9903a5abade6a2c8d1423e95bd993bea375e03617afbbbe51c0d4a7ed7a56cc76d87b00d6019c6ab09fdcce8d4362036f184513f01ccc716f186ea3fe6f1ee1ca31c9dc7ed62b21cbba2f62ec602639286d0f4fb69b6999273ddeb692755609d58fcd839bece3b321950d2ba337f0ee847377d324fba58c37eee3530114e40f8b54a200f1def104e8dc889906e257616973958a8552798cd7341f99bf1cb5e6232e24c72d29584a345e48454fe3e973c7d18d6eb04a98db43ba2c2bb5c3668e25acd749027fd01baa6bce45373a3f07cba839d8b7913caab2c4e3f98fb0aa55fa5", 0x1000}, {&(0x7f00000016c0)="a8e84bc78f174462f97657cc371ed999d26e52cd4939186cccb1893b8e24412e514a82904749ec784687cad691a2c64aaa30cccffca6bcadcaeff8d95d19e5036916ace2708aa9f59bbe0a126a168559004b522d3dfbee7ed3fe2be4ded3ab8feffc10cff44b4a1cbe5f12b275580431bf1d41753323f2917b5c8e1ea6ad7db3e3cffd82eb2a226516dc0a6fe399f49ac08dfc4b8865cc41e3a31f0443828c37fff8530a0290977f1852f13357106a1e5ffe8c38fd43ee6819a5a413e11867cabef6e6f543ddc19706b6cf1bc186e5e9d9f770bd", 0xd4}, {&(0x7f00000017c0)="73f1833a607097f2ecf610128a848134ffc32e9eef9f8d0181cc8b8a6bef5cd185bdf210124c509f0e3641e4ac931d14ac6a1567ed6acc96782bc8fdeb0eb30d7139fab40501ebaa07a10dac74d2fc2c2b8681a7959da27752be6d1eae096a7c27a9fbc99425313416c4e2b1303db13b23c3e979ba933d79503f697a", 0x7c}, {&(0x7f0000001840)="6fcbefe4401e03d4638ea45f5b9ebec07cc5", 0x12}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="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", 0x1000}, {&(0x7f0000003880)="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", 0x1000}], 0x9, &(0x7f0000004940)={0x98, 0x10c, 0x6a467fd8, "b10f42288141fe0d3f2b4bd63777384be2a4864e0f514489f57ddda1661d63411883dedf0e34f05cd51df917d5027332cf7a2734919754cff068d8a6fb7ee274006ff01a18e28420220eebd9217505756cf833cccc4f67fb754e580ff0ba8cfaf63b2c05894a91a460f4d17deb3acdfa9bcd4d27cbe378a7ec5af4d883f1028072430b0724"}, 0x98, 0x880}], 0x4, 0x20000017) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r9, 0x0, 0xd811) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0xd811) timerfd_gettime(r10, &(0x7f0000005400)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r9, 0x4010640d, &(0x7f0000000040)={0x4}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x4, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) setpriority(0x0, 0x0, 0x6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(r7, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r9}, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000000)={r9, 0x1000}, &(0x7f0000000040)=0x8) 15:19:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x33d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000001c0)=0xa16c, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7aa, 0x301800) fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000440)=@generic={0x3, 0x100000000, 0x40}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000600)={0xc0000000, 0x100, "bdfad40f678291a810283ee14d53a4f41778543f66af34fe0a83e2fce993640f", 0x8, 0x2, 0x8, 0x0, 0xdf42, 0x1, 0x101, 0x0, [0x7fffffff, 0x8797, 0x5, 0x80]}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x12080, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000005c0)={0x1, 0x1, 0x3, 0x10, 0x1a3, &(0x7f00000001c0)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$VIDIOC_QUERY_EXT_CTRL(r5, 0xc0e85667, &(0x7f0000000040)={0x80000000, 0x2, "e002663ed4562b2879bc7d8a7ccb6b51ee6cc5616daef0a5089510e111ad8249", 0x1a1, 0x6, 0x7, 0x7, 0x7fff, 0xff, 0x0, 0xff, [0x3, 0x101, 0xae3f, 0x6]}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x34d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e8, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1017.808360][ T7107] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1017.875504][ T7107] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1017.989885][ T7107] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xd811) ioctl$SIOCAX25GETINFO(r8, 0x89ed, &(0x7f00000001c0)) getsockopt$inet_opts(r4, 0x0, 0x0, &(0x7f0000000080)=""/136, &(0x7f0000000140)=0x88) sendfile(r3, r4, 0x0, 0xd811) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f0000000040)={0x6, 0x6, 0x7}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x2, 0x9, 0x0, 0x4, 0xc7, 0x3, 0x7, 0x5, 0x4, 0x80, 0x8000, 0x80, 0x7889, 0x200, 0x800, 0x8000, 0x0, 0x91, 0x8, 0x1ff, 0x1, 0x1, 0x100, 0x5, 0x0, 0x10000, 0x7, 0x80000001, 0x4, 0x4, 0x4, 0xffffffff]}) 15:19:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7e9, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x35d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1018.557892][ T7107] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {0x7, 0x0, 0x2, 0xffffffff}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0xd811) ioctl$VIDIOC_S_JPEGCOMP(r7, 0x408c563e, &(0x7f00000001c0)={0x2, 0x1, 0xe, "5adaef88015e957b36f255b2e5a220b2779677ad63b815acdd68f77990fdd65fd1035ed584dd4ace561f58c9513433520855998f4c30e047c5139150", 0x39, "74b1c5c9d0675c5c37eb6540ceb37461c1807aef033cf07bb58b601217f60121c71f4ba392f408d60ecfbad2a6d465bf82463840378d5a7cd86dc8fb"}) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f0000000100)={0x1, 0x1, @start={0x1}}) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r8, 0x0, 0xd811) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r9, 0x40086432, &(0x7f00000000c0)=0x6) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040), 0x4) [ 1018.691611][ T7107] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x36d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1018.838366][ T7107] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x6d, 0xb1, 0x1, 0xff, 0x0, 0x9, 0xc0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x5, 0x3f}, 0x2, 0x6, 0x5, 0x9, 0x1880, 0xfff, 0x8}, r2, 0xb, r0, 0x8) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r1}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) sendto$phonet(r5, 0xfffffffffffffffd, 0x0, 0x4000811, &(0x7f00000001c0)={0x23, 0x8, 0xf0, 0x2}, 0x10) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8003110dff2e3d48c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611a00004f8b87e4d1d57f9d1207005a4237a820525000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee07860917196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335e876bdaf64289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4d44c5833dd6646783f47a9473a5e7408261418f44812d7de0e5b1b12152876b7a61eb1a6bcf33d1f9330eb42d4562c4e96969e5ffacbd4a4deb502ace7c1248fd4746979d1f6b98f7e50f0c7a45f897225bdd2238967f2c3b86f9362f64bdc3199cf4569fb2898cd86a8e85464f1e90a3480b1d9d6a25ac7b3b1a701c09db2a6cd480f542a6013a6860b80c5668f421d4cf97bd7d31f0ded6ca307fc09515cd6422e23000000000000000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ea, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1018.919560][ T7226] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1018.985461][ T7226] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1019.137722][ T7226] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x4, 0x8, 0x401, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x11) 15:19:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7eb, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x37d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:41 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000600)={0xc0000000, 0x100, "bdfad40f678291a810283ee14d53a4f41778543f66af34fe0a83e2fce993640f", 0x8, 0x2, 0x8, 0x0, 0xdf42, 0x1, 0x101, 0x0, [0x7fffffff, 0x8797, 0x5, 0x80]}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x12080, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000005c0)={0x1, 0x1, 0x3, 0x10, 0x1a3, &(0x7f00000001c0)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$VIDIOC_QUERY_EXT_CTRL(r5, 0xc0e85667, &(0x7f0000000040)={0x80000000, 0x2, "e002663ed4562b2879bc7d8a7ccb6b51ee6cc5616daef0a5089510e111ad8249", 0x1a1, 0x6, 0x7, 0x7, 0x7fff, 0xff, 0x0, 0xff, [0x3, 0x101, 0xae3f, 0x6]}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) [ 1019.449856][ T7397] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1019.509063][ T7397] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x5}}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x430}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008881}, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000540)=[{{r7, r8/1000+60000}, 0x1f, 0x8, 0x230b0371}], 0x18) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GET(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x50, r10, 0x1, 0x0, 0x0, {0x5}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x50}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x4, 0xa2, 0x7, 0x9, 0x3, 0x3, 0x3, 0x3d6, 0x40, 0x208, 0xff, 0x9, 0x38, 0x2, 0x52, 0x6, 0x1}, [{0x2, 0x3ff, 0x4, 0xaf6, 0x4, 0x0, 0xae42, 0x81}], "8739c4ec28a6d6af12eea3d0626a1eeb6cb685131cdf92604de8b7af51e10beb91cbc8cab689f20dbe7e07905a94cf2198f852ac52d67093dfc8d05729328cd918d7d99cb4b3205df716ffb1f06bb74482a06412b39451bb6f5fbf72f6a75ccfadbe6219f7dc0f51938e18e674c457dd4efb0140387c7e4b26c815d64396ce06300b032fc8113f50a82e7a87301f18d8dabd6d897150c7ad4bf6f1a6325a822d193943d7337563c64de801d90db1db4569", [[]]}, 0x229) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x1e4, r10, 0x300, 0x70bd2a, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1000}, {0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x4}, {0x8, 0xb, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0xc6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0x7}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfc7}, {0x6, 0x16, 0x2}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x8}, {0x8, 0xb, 0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x800}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x40}, {0x8, 0xb, 0x3224}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x80000000}, {0x6, 0x16, 0xb4}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x5}, {0x8, 0xb, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7fffffff}, {0x6, 0x16, 0x6}, {0x5}, {0x6, 0x11, 0x1}, {0x8, 0xb, 0xffffffff}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x84}, 0x10) [ 1019.591904][ T7444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7444 comm=syz-executor.5 [ 1019.660829][ T7397] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032c9f9945c53"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x38d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:42 executing program 5: syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) socket$phonet(0x23, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @empty}}}, {{@in6=@mcast2}}}, &(0x7f00000008c0)=0xe8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_delroute={0x2c, 0x19, 0x800, 0x70bd27, 0x25dfdbfd, {0xa, 0xe0, 0x14, 0x1f, 0x0, 0x2, 0xc8, 0x0, 0x2400}, [@RTA_IIF={0x8}, @RTA_UID={0x8, 0x19, r7}]}, 0x2c}}, 0x0) r8 = fcntl$dupfd(r1, 0x0, r0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0xd811) ioctl$VIDIOC_S_SELECTION(r9, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {0x0, 0x0, 0x7}}) [ 1019.923155][ T7521] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ec, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 1019.923289][ T7521] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x90001, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000001c0)={0x1d, @empty, 0x4e23, 0x0, 'nq\x00', 0x25, 0x1, 0x21}, 0x2c) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r3, 0x0, r2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1019.923304][ T7521] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 [ 1020.075883][ T7556] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7556 comm=syz-executor.3 15:19:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x39d584d5, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:42 executing program 5: syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000080)=@int=0x9, 0x4) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r7, 0x0, 0xd811) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000000)={0x4, 0x0, 0x0, {0x0, 0x4, 0x2}}) [ 1020.118969][ T7482] IPVS: Error joining to the multicast group 15:19:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1020.569022][ T7689] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:19:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ed, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1020.656830][ T7532] IPVS: Error joining to the multicast group 15:19:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0xa3, @loopback, 0xfffffffe}, {0xa, 0x4e22, 0x400, @ipv4={[], [], @multicast2}, 0x4}, 0x8000, [0x9, 0x14, 0x8, 0x469, 0x86, 0x7, 0x6, 0x1]}, 0x5c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x39d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1020.850484][ T7788] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1020.863460][ T7788] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1020.878610][ T7788] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={0x0, 0xfec00000, &(0x7f0000000340)={&(0x7f00000000c0)={0x24, r2, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x300, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4040010) 15:19:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x5}}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x430}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008881}, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000540)=[{{r7, r8/1000+60000}, 0x1f, 0x8, 0x230b0371}], 0x18) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GET(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x50, r10, 0x1, 0x0, 0x0, {0x5}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x50}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x4, 0xa2, 0x7, 0x9, 0x3, 0x3, 0x3, 0x3d6, 0x40, 0x208, 0xff, 0x9, 0x38, 0x2, 0x52, 0x6, 0x1}, [{0x2, 0x3ff, 0x4, 0xaf6, 0x4, 0x0, 0xae42, 0x81}], "8739c4ec28a6d6af12eea3d0626a1eeb6cb685131cdf92604de8b7af51e10beb91cbc8cab689f20dbe7e07905a94cf2198f852ac52d67093dfc8d05729328cd918d7d99cb4b3205df716ffb1f06bb74482a06412b39451bb6f5fbf72f6a75ccfadbe6219f7dc0f51938e18e674c457dd4efb0140387c7e4b26c815d64396ce06300b032fc8113f50a82e7a87301f18d8dabd6d897150c7ad4bf6f1a6325a822d193943d7337563c64de801d90db1db4569", [[]]}, 0x229) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x1e4, r10, 0x300, 0x70bd2a, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1000}, {0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x4}, {0x8, 0xb, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0xc6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0x7}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfc7}, {0x6, 0x16, 0x2}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x8}, {0x8, 0xb, 0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x800}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x40}, {0x8, 0xb, 0x3224}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x80000000}, {0x6, 0x16, 0xb4}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x5}, {0x8, 0xb, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7fffffff}, {0x6, 0x16, 0x6}, {0x5}, {0x6, 0x11, 0x1}, {0x8, 0xb, 0xffffffff}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x84}, 0x10) [ 1021.074700][ T7792] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1021.087240][ T7792] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1021.101937][ T7792] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="4400000010001fff00000000000000000000000055e098ecc802223b199522b2581e31ba16f25332b381d4554ee99e00fd72246b8d47c3b4d8e1e86c18dc305c2dfbe011b1d40b00f4568a1e6fc909c2b3c97ea95c7c66e19570501a9b70e6478bd05206d8911b9c45e7cd46e587e95988d4023ddb4148863c560a049a72a69219b9ae7df9d31d81089648a4a4f53d1487863eee3a", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000280080002009e83cfc6cf056de44d411ee25fccc3fa4bb6683821e065ac617ef43872799a92addcd8ef06b4c4bbfc3d81", @ANYRES32=0x0, @ANYBLOB="05fd000505000000"], 0x44}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r5, 0x28, 0x6, &(0x7f0000000140)={r6, r7/1000+10000}, 0x10) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) 15:19:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ee, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3ad90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000000c0)='lo\x00') r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r3, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x28, 0x140d, 0x800, 0x70bd27, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008080}, 0xc045) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1021.615904][ T7886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7886 comm=syz-executor.4 [ 1021.629460][ T7901] IPVS: Error joining to the multicast group [ 1021.725632][ T7950] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1021.750019][ T7950] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c026520800009d294e6efe50731a6edf3d8300000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a65c022a58a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413ca8a8f2571aec944cc2921448e181f601a6f8d652eef070084ecb28de5e88c49fdc9f8f7a79d16cb252f3f2eda087ee0dbe3180196877de534efd2b5397132bf7a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd85a9849c683ee4b52c6fe8cf912d486efb05543640c3e8eed5484a8805823ded64b2ba9032"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3bd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1021.932626][ T7942] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1021.935633][ T7950] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ef, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:44 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1022.033674][ T7966] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:19:44 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) ioctl$TIOCL_SELLOADLUT(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x6d, 0x3, 0x7, 0x8}) [ 1022.292990][ T7902] REISERFS warning (device md0): reiserfs_fill_super: Cannot allocate commit workqueue 15:19:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000000c0)='lo\x00') r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) fcntl$dupfd(r3, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) [ 1022.384703][ T8073] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1022.425235][ T8073] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1022.438014][ T8073] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:44 executing program 5: syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) getsockname$tipc(r5, &(0x7f0000000080), &(0x7f00000000c0)=0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0xd811) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) recvfrom$x25(r8, &(0x7f00000001c0)=""/200, 0xc8, 0x40, 0x0, 0x0) r10 = fcntl$dupfd(r1, 0x0, r0) r11 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r10, r11, 0x0, 0xd811) ioctl$VIDIOC_S_SELECTION(r11, 0xc040565f, &(0x7f0000000040)={0x5, 0x0, 0x0, {0x0, 0x80}}) [ 1022.589378][ T8167] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="020000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd811) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4cc000, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) listen(r3, 0xb4) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413008a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132017a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3cd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1022.637462][ T8167] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1022.651485][ T8167] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = dup3(r2, r3, 0x0) flock(0xffffffffffffffff, 0xd) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') write$UHID_CREATE2(r4, &(0x7f0000000200)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x9, 0x1, 0x7ff, 0x23d, 0x80}}, 0x118) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x100000, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@dfltuid={'dfltuid'}}, {@dfltuid={'dfltuid'}}, {@access_any='access=any'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x36, 0x35, 0x32, 0x62, 0x61, 0x38, 0x39], 0x2d, [0x63, 0x32, 0x30, 0x34], 0x2d, [0x34, 0x34, 0x33, 0x64], 0x2d, [0x66, 0x34, 0x62, 0x63], 0x2d, [0x63, 0x65, 0x65, 0x65, 0x35, 0x61, 0x31, 0x35]}}}, {@appraise_type='appraise_type=imasig'}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user'}}, {@uid_gt={'uid>', r6}}, {@dont_measure='dont_measure'}, {@audit='audit'}]}}) syz_open_pts(0xffffffffffffffff, 0x20040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r7, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1023.048049][ T8239] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1023.094631][ T8239] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1023.263216][ T8239] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="020000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd811) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4cc000, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) listen(r3, 0xb4) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6d6430007d102ce19cc21e9fbadbe16747b5ffe9c0265208000000000000009ba87bc81eb01dba0605d8e33010dff2e3d470bbaaef9f8a96f6ef8c96d2f93c0858d2840700000057b92dfa806f60d6827aa0210d275b3d4a1069adeb63e06aefea43af4e5efe753d4b4be3611abf244f8b87e4d1d57f9d1207005a4237a820425000098413008a8f2571aec944cc2921448e181f601a6f8d652eef562284ecb28de5e88c49fdc9f8f7a79d16cf252f3f2eda087ee0dbe3180196877de534efd2b5397132017a7ef27d199e289056165473d19541333613dfbd331f956634f3721eb188dcc9e2248932632fbaa3338b9fee7d582a49ed7069152ae8254b59fb335eef71ad5a4289e5a0334fd058a5af07feeb308e4c4276b3e9b61849edc82415301116e5e843f74d1a8aa501b11ec9ea8c4b42fd721ac4b74c5833dd6646783f47"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x44, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x492001, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x6, 0x218202) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x7c) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000200)={0x0, 0x6000, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="8de72506f9493914f301fcd741039cd4aba9bd5b4148eb73ce8c61f11b69392bc97bc428baa43fefa92226e2807dee5eb60d71fd6a9acdfc3443a9307ae19a8a978e7bf8394d093481a83fe2cda66c8b9cb338e30a52a2db10cb4a6e6c16e166889f6928d1e8ad8a8d8a83bca23dbd5016612078d41bc1c01ad71d466292c2", @ANYRES16=r4, @ANYBLOB="95c40000000000000000010000000000000004000000004c00180000000062726f6164636173742d6c696e6b00"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200000c4}, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000000)={0x9, 0x1, 0x0, {0x0, 0x80, 0x1}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0xd811) getsockopt$PNPIPE_INITSTATE(r8, 0x113, 0x4, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 15:19:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3dd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f1, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3ed90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1024.226931][ T8408] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1024.278251][ T8408] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1024.294831][ T8408] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3f000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1024.440207][ T8428] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1024.470176][ T8428] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1024.508686][ T8428] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="020000"], 0x2000, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd811) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x7fff, r0}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4cc000, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) listen(r3, 0xb4) fcntl$dupfd(r2, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = dup3(r2, r3, 0x0) flock(0xffffffffffffffff, 0xd) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') write$UHID_CREATE2(r4, &(0x7f0000000200)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x9, 0x1, 0x7ff, 0x23d, 0x80}}, 0x118) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x100000, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@dfltuid={'dfltuid'}}, {@dfltuid={'dfltuid'}}, {@access_any='access=any'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x36, 0x35, 0x32, 0x62, 0x61, 0x38, 0x39], 0x2d, [0x63, 0x32, 0x30, 0x34], 0x2d, [0x34, 0x34, 0x33, 0x64], 0x2d, [0x66, 0x34, 0x62, 0x63], 0x2d, [0x63, 0x65, 0x65, 0x65, 0x35, 0x61, 0x31, 0x35]}}}, {@appraise_type='appraise_type=imasig'}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user'}}, {@uid_gt={'uid>', r6}}, {@dont_measure='dont_measure'}, {@audit='audit'}]}}) syz_open_pts(0xffffffffffffffff, 0x20040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r7, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f2, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:46 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x40, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x3fd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1024.861867][ T8604] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) [ 1024.917056][ T8604] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) [ 1024.937155][ T8604] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = dup3(r2, r3, 0x0) flock(0xffffffffffffffff, 0xd) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') write$UHID_CREATE2(r4, &(0x7f0000000200)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x9, 0x1, 0x7ff, 0x23d, 0x80}}, 0x118) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x100000, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@dfltuid={'dfltuid'}}, {@dfltuid={'dfltuid'}}, {@access_any='access=any'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x36, 0x35, 0x32, 0x62, 0x61, 0x38, 0x39], 0x2d, [0x63, 0x32, 0x30, 0x34], 0x2d, [0x34, 0x34, 0x33, 0x64], 0x2d, [0x66, 0x34, 0x62, 0x63], 0x2d, [0x63, 0x65, 0x65, 0x65, 0x35, 0x61, 0x31, 0x35]}}}, {@appraise_type='appraise_type=imasig'}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user'}}, {@uid_gt={'uid>', r6}}, {@dont_measure='dont_measure'}, {@audit='audit'}]}}) syz_open_pts(0xffffffffffffffff, 0x20040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r7, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f3, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x10000, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd30, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c4}, 0x10004881) socket$inet6(0xa, 0x80000, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x15) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0xfffffffd, 0x1, 0x0, 0x0}) 15:19:47 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x1000, 0x113881) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) sendfile(r7, r8, 0x0, 0xd811) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xdfc, @mcast1, 0x6}}, 0x8, 0x4, 0x1, 0x80000001, 0x4, 0x0, 0x40}, 0x9c) sendfile(r3, r4, 0x0, 0xd811) accept$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) 15:19:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x40000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:47 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000040)={0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0xc004aea7, &(0x7f0000000140)=0x93bc) r5 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000080)=ANY=[@ANYBLOB="0200b30036ad138853a00d9e21b1f26b18465a8f981bac986d35ee920b29517eb516a9afb5c9a627178a9fd37df29dd9d40988fc787d829d6daf51e1d46b446f9aeddc0155b2f4eeb406ebc2df2f91be19ed5b8e0b9542c9295cafab76171697d2074ba4bcd0cdffffb0d17795fbea078aee322a5d280ca544887f166ad121986c269190b891fe886bc8259927ee60a80101bcc17152e2f424f6aaa557609aac639bc834d00af41a5173a5876b9d0b945720f3b51d2391"]) [ 1025.998720][ T8808] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8808 comm=syz-executor.3 15:19:48 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:48 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x103, 0x2, {0x27e6}}) 15:19:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x40d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$KDFONTOP_SET_DEF(r4, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="028000e9cab66862"], 0x2000, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x33cf, 0x0, 0x4, 0x0, 0x401, 0x3, 0x2000, 0x7fff}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000003c0)=""/82) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x1a, "feced378b7729d895e292261c6e9136b8d0c8733708835f338c8"}, &(0x7f00000001c0)=0x22) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xab, "b6956526e2a3509ea7baa34a1a44413e0351f6c7233c63abf86b36fc5f785cc73a04652ec5ab288d6b034d170741ee2506000000697e977cd87320006aaa41897e87f2490147fc71f34888a951f4b91f6db52b326874bb443674ab2ec9eec25eb032142aa59e5d190987ca9317a0cc74ffe0bdd130d8dc9c71cf72f45f23c114876bde43603ee29337b7a1933c17d58653073e7c2bafe90124ff60bfb3e7a1a345764b35bf0cdd08fc0d0f"}, 0xb3) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x1, 0xffffffffffffff28, 0x0, 0x0, 0x0) 15:19:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:48 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:48 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x103, 0x0, {0x2, 0x0, 0x0, 0x2}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f00000001c0)={0xffffffff, "4e4147d19a90ed4a9c092fa7ff2a4d6cfaa8b25dbe71aa94ffb263318587bea0", 0x3, 0x5, 0x1, 0x0, 0x1010000, 0xc}) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x15, 0x3, 0x0, "55013e68d9a1ba79d098af08a358f861"}, 0x15, 0x2) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x1, 0x10000, [], &(0x7f0000000040)=0x6}) 15:19:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) waitid(0x2, r1, &(0x7f0000000000), 0x20000000, 0x0) r2 = dup(r0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f5, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x41d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010001fff000000100000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028008000200", @ANYRES32=0x0, @ANYBLOB="0500010005000000"], 0x44}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x138, r5, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}]}, @TIPC_NLA_BEARER={0x7c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x64010100}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x64010100}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcb66}]}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x71ffb68b79adc0ca}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x18000, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1026.630379][ T8961] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 2, size 4096) 15:19:48 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) [ 1026.747619][ T8961] REISERFS warning (device md0): sh-2006 read_super_block: bread failed (dev md0, block 16, size 4096) 15:19:48 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 1026.802112][ T8961] REISERFS warning (device md0): sh-2021 reiserfs_fill_super: can not find reiserfs on md0 15:19:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x42d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f6, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) 15:19:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x43d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000040)={0x2, 'netdevsim0\x00', {0x101}, 0x3}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x7, 0x0, 0x0, {0x0, 0xfffeffff}}) 15:19:49 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:19:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$DRM_IOCTL_AGP_ENABLE(r4, 0x40086432, &(0x7f0000000040)=0x3b) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r6, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0xfffffffd, 0x0, 0x0, 0x0}) 15:19:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) 15:19:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000040)=0x1000) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x9, &(0x7f0000000000)=""/21) ioctl$KDFONTOP_SET_DEF(r6, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:49 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x44d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0xd, 0x1, 0x6, {0x0, 0x2a, 0xfffffffe}}) 15:19:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f7, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) 15:19:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x802) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x45d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:19:49 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xd811) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xd811) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(r7, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r9}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000080)={r9, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000100)={r10, 0x4, 0x800, 0x3, 0x80000000, 0x7}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000040)) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0xffffffff) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xd811) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000002c0)="4c68955f1bdeb10cdc1c6b39c3d1426ff0ce73d924e75a5e55116186cf88057f7378397b7458cab0bb3e05f492ac1416caffea1570d18fce2be9b7914541d663901fc5f80c2ce78cee667b3d09debf24fa3ad2be57b2ee125313f930ddedd88f842f802ecd44e43248b3feb912c7150cf867aa6792cd9114c0f6731e3f4aeef7287ae2e25a1079015fd4a81f55593b3605ad94f9c711959906c96798fa5789c2f4eb934c4b9eff85409db83244f1647e"}, 0x20) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xa7f8, 0x4a003) ioctl$PIO_FONT(r7, 0x4b61, &(0x7f00000001c0)="9809e3155ae97505ebd64108d3d8689a5e84097f72adbcc8eb02562786477b5391f26a35c190ba33f5200f357cccca8650b224655f965755157a82a76d6fb7582b373c2370847137ad2dd18f5272fda9917222b153d3dc9d8428070d18165363b7f783589db9f76bb1e2ad4db19642434b0be155f0561485a641f554f2242988be5ec17813c706776f6c0239aa150fa3bf2ca7e62fb9523f4f7f022e8b6bacb85279eb7752315ffd62eceb1081885018ab7b28b12ef51d04552206488ff2d8e0d325261c36cb4809070ca3bdb0a3b9637fa59468ce1db3598331fc34617551bd18e80aa36672d27ae9e7775de0") ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f0000000080)={0x18, 0xfdc, 0x7, 0x8, 0x5, 0x81}) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r9, 0x0, 0xd811) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4001fc) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$9p(r8, &(0x7f0000000380)="09a22c9b2579c7debeaf5f765fd125318b3eca57fb8049650c66ab27fd3734aaf2cb33cef9a345f90570d076b70a531b53499ee38ff40640e26bb786e16862753b147e8f486854948cce113be6da8f4935b53ce91745d6b5359db12e3ddcd3edb1dd654f13bf858efd34124841d7f3177c5b4ed55dced09b92800ec86a14ae744f086a871d8d57b92e3fde188cbd2af58389fab99de61b810e76b1b9d6a94575ac5f381eee094428cd95a19d4ca431babc6ba39e51b61ce075848d0c85c5be9d6b895cbb66aa2f99e8fe8036569d52af20fd3b7f1308e4b34181f6d0ec9c7f82108eea", 0xe3) ioctl$KDFONTOP_SET_DEF(r10, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x46d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f8, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x47d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x1fb, 0x0}) 15:19:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:50 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:50 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7f9, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:50 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x48000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:50 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(r0) r1 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000000)={0x2, 0x102, 0x0, {0x0, 0x7, 0x0, 0x80}}) 15:19:51 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7fa, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:51 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x48d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r2, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r7 = socket(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="4400007a72ef33213ac493bdf64b5f2408bc0000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100726564001800020014000400"/44], 0x44}}, 0x0) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r6, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8004) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000400)=0x1) 15:19:51 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7fb, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:51 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x49d90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:51 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x88001) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xd811) ioctl$KVM_SMI(r1, 0xaeb7) r3 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) setuid(0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="020000000100000000000000021627437418cc7924b70000001edfa02e030d26a0e3b2c98b3034f76c320372c5dca446e24187cce1c4763bb7fce6a6449057f15a8fea514069c13176902dd6225e63a2093ff0ca6c1100edba7cd02d2da489e274750862dde37938120990076243892d9df6ec8a6127af12faf54b06c2ee98fbabb7a7402613d4487f66da2466f6801c6b9dd2f961eca68a3411872174c6869271c73d9a8ab93f881a51261a298563d7e99b906d64f894e146feeff9fdf3b9f9e9e3140781a9e7c0c92f50c4d92093ea274ba40b0c0d8ba77997009991bebe53efe55edf3016061d0d56113c4fd3df83000000000000000000", @ANYRES32=0x0, @ANYBLOB="0215c000", @ANYRES32=0x0, @ANYBLOB="02000378b0486dc3bb9a526d00", @ANYRES32=0x0, @ANYBLOB="020000006c34548ed9344da48166334221f152041045eb809928727d7cee0f77e663cc40b54db5ddfc002718c0860022580fb3a734360e273b592d6d39d35a06c7a312000011668cb29336f52df5f3b5ab329af716da9876144d06ba503d2eb3de6166f71cb22fdadfd330341d2e7a6e901a327566290f4bb6a0fc075ad79658f1817d0a7ef2628bde32ffb2fd6cf6cdc391692479813d57b93bd681379b56ac2cb75ef5ef1d8263b8e86556999733b8e9cd6d7634e19a6743c5ab97a06abc77595d9bae4dc9516523f6abf5eb030f27813c1e743cab7c7ba044e5e3964cb115ba5be25b945762331a697cb2606eb330d088e7ea01865d94fa26", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020003009b05b8cabcd14ee20c22534e7fd465ae418b93a77ce1e41664022d41", @ANYRES32=0x0, @ANYBLOB="040001000000000008000100", @ANYRES32=r9, @ANYBLOB="08203480976d5bc7cb961b966fdabdb9a8a36259768613325553b940758526bdd8e2dd64287be4063b7dca34923cf501614641f5123f77180dcb36d08696b94036773c33c7f3007d11b5768629adc25b6bdc2be59dd79a4986670197df2517d07f02d12a2ca8852897a6195122e08034eb9556b019f18f7e3967c29930ed86fa8ec9cae836d4d16ae986f0a204cbaf5ba94da15c47560b2e24e3bec0a923bfe1e21686e9df33dc95902c88dda0ee933935c32bdfe1aef670731722001e545d", @ANYRES32=0x0, @ANYBLOB="1000040000000000200001fd6a36c1007403ac24348f4343f55d944763f78e2d1fe27e29098670520215cd96c10eb4e34d6c68fa6cdf81d742a98ba8d45c21e60b8dc1d186bf63fe36067f50fb2e5a6b95c882412c5b93d845d33c5bc4c8c1d76b01963d704dcb12959c0566ae82554a65f8d561590fbdc8e8126b631cf2dbcda94f77886d8067a1e1272f436ceea7dd07d59bf61e7d4d884608cf8f82ddb295ff088ff5fbb7d7996600bf195893de2e8db7fb81a8fdca63c274a9b71d52e38c32068f0478664640a413623860b5d6db4da70573c2adaa0800000039f0c90cf0532574f2690aa482440988f2d5db0fab66"], 0x64, 0x3) keyctl$chown(0x4, 0x0, 0x0, r9) sendfile(r6, r7, 0x0, 0xd811) ioctl$HIDIOCGFEATURE(r2, 0xc0404807, &(0x7f00000001c0)={0x3, "627fb99f7175ecf67c43fa7fa906a5d6c5422c330cbfa14e36f1051161f0f316794892e4699fa48b42fdbc5b12ee8e5ea556686e800994aaab3b21634c203b64"}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r6, 0x81785501, &(0x7f0000000080)=""/206) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000000)={0x9}) 15:19:52 executing program 3: socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x1c, 0x0, 0x0}) 15:19:52 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7fc, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:52 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x4ad90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:52 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000240)={0xf000000, 0x7, 0x7, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x9b090e, 0x101, [], @p_u8=&(0x7f0000000140)=0x67}}) setsockopt$llc_int(r3, 0x10c, 0x4, &(0x7f0000000280)=0x1ff, 0x4) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0xd811) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xd811) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f00000002c0)={0x2, 0x4f23a64a}) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000010001bff00000000006a2371d84e211e3800003121758eedcb3502fb32020860af735b7134f27fa1144d07d7ab387e000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028008000200", @ANYRES32=0x0, @ANYBLOB="0500010005000000"], 0x44}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000040)={0x390000, 0x81, 0x101, r9, 0x0, &(0x7f0000000000)={0x9909e2, 0x3f, [], @value=0x3}}) ioctl$sock_SIOCOUTQ(r10, 0x5411, &(0x7f0000000080)) syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x400000d77, 0xfe3882) 15:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7fd, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:52 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:19:52 executing program 4: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) [ 1030.632686][T10144] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:19:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x4bd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1030.718022][T10182] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:19:53 executing program 4: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:53 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7fe, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:53 executing program 4: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:53 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) 15:19:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x2, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000140)={0xdd, "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"}) 15:19:53 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r0, 0x0, 0x0) 15:19:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x4c000000, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d7ff, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:53 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x1f, 0x7f, 0x8d, 0x63da, 0x3, 0x3, 0x1, 0x210, 0x38, 0x248, 0x10000, 0xfff, 0x20, 0x1, 0x800, 0x1, 0xa000}, [{0x60000000, 0xd5, 0x8, 0x9, 0xef5, 0xbf2, 0x6, 0x7}, {0x7, 0x5, 0x4dd, 0x100, 0x9, 0x81, 0x80000001, 0x5}], "659a7e6c6597892163a671167acda985ccf7d4df3a2a7555fc5f2b0d6e6420b3639c9ed70ddd5d74ff377fb1711c647acfc256e19e098b6f04565a", [[]]}, 0x1b3) [ 1031.363890][T10375] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 1031.375730][T10375] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 1031.384428][T10375] CPU: 0 PID: 10375 Comm: syz-executor.4 Not tainted 5.8.0-rc3-syzkaller #0 [ 1031.393189][T10375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1031.403330][T10375] RIP: 0010:qrtr_endpoint_post+0x92/0x1010 [ 1031.409260][T10375] Code: 44 89 e6 e8 c0 52 50 fe 48 85 c0 48 89 c5 0f 84 c4 0e 00 00 e8 8f 67 96 f9 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 4a 0d 00 00 [ 1031.428873][T10375] RSP: 0018:ffffc90018aafc60 EFLAGS: 00010202 [ 1031.435058][T10375] RAX: dffffc0000000000 RBX: 0000000000000010 RCX: ffffc90011714000 [ 1031.443397][T10375] RDX: 0000000000000002 RSI: ffffffff87dd4f91 RDI: ffff8880919ef790 [ 1031.451465][T10375] RBP: ffff8880919ef780 R08: 0000000000000001 R09: ffff8881e7c23ae3 [ 1031.459534][T10375] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1031.467602][T10375] R13: ffff888086cc3000 R14: ffffc90018aafec8 R15: 0000000000000000 [ 1031.476015][T10375] FS: 00007f3f2bef4700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1031.485128][T10375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1031.491724][T10375] CR2: 000000000073d138 CR3: 00000001fdf94000 CR4: 00000000001406f0 [ 1031.499799][T10375] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1031.508566][T10375] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1031.516684][T10375] Call Trace: [ 1031.520066][T10375] ? __check_object_size+0x30/0x3e4 [ 1031.525397][T10375] qrtr_tun_write_iter+0xf5/0x180 [ 1031.531043][T10375] new_sync_write+0x422/0x650 [ 1031.535741][T10375] ? new_sync_read+0x6e0/0x6e0 [ 1031.540720][T10375] ? inode_security+0x102/0x130 [ 1031.545592][T10375] ? security_file_permission+0x239/0x470 [ 1031.551599][T10375] __vfs_write+0xc9/0x100 [ 1031.556073][T10375] vfs_write+0x268/0x5d0 [ 1031.560332][T10375] ksys_write+0x12d/0x250 [ 1031.565295][T10375] ? __ia32_sys_read+0xb0/0xb0 [ 1031.570169][T10375] ? lock_is_held_type+0xb0/0xe0 [ 1031.575297][T10375] ? do_syscall_64+0x1c/0xe0 [ 1031.579912][T10375] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1031.586010][T10375] do_syscall_64+0x60/0xe0 [ 1031.590515][T10375] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1031.598823][T10375] RIP: 0033:0x45cb29 [ 1031.603274][T10375] Code: Bad RIP value. 15:19:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1031.608026][T10375] RSP: 002b:00007f3f2bef3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1031.620014][T10375] RAX: ffffffffffffffda RBX: 000000000050e0e0 RCX: 000000000045cb29 [ 1031.628316][T10375] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1031.636735][T10375] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1031.644893][T10375] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1031.653512][T10375] R13: 0000000000000d2a R14: 00000000004cf85d R15: 00007f3f2bef46d4 [ 1031.661582][T10375] Modules linked in: 15:19:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x4cd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 15:19:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="240a28bd000085cca9c71200000058000000000000000000746500000000000000ec0000000000000000"], 0x30}, 0x1, 0x0, 0x0, 0x40800}, 0x8844) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x54, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vcan0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) fcntl$getown(r0, 0x9) r2 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x8, 0x202040) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xd811) ioctl$SIOCX25SSUBSCRIP(r4, 0x89e1, &(0x7f0000000040)={'bridge_slave_1\x00', 0xadc, 0xffffffff}) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x0, {0xb10, 0x0, 0x0, 0x10}}) 15:19:54 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x88001) write$binfmt_elf32(r0, 0x0, 0x0) [ 1032.030525][T10375] ---[ end trace ff54fd51f6049c12 ]--- [ 1032.044417][T10375] RIP: 0010:qrtr_endpoint_post+0x92/0x1010 [ 1032.052920][T10375] Code: 44 89 e6 e8 c0 52 50 fe 48 85 c0 48 89 c5 0f 84 c4 0e 00 00 e8 8f 67 96 f9 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 4a 0d 00 00 15:19:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x1d800, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 15:19:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x400000000000004, 0x45) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) sendto$inet6(r4, &(0x7f0000000440)="ee", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x7b, &(0x7f0000000040)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000140)={r6, 0x1000, "a683668781b5b2f3e5901373da25d74ccb137292fd1a167d6702b8bdba70c96377dcb0110bd4462a4951e8d15f017b21d40ecfa2124b0ed3c309b0aff471b76deacbd5cd620c4a5a51d5175e9d5240620c43c1eba445e934be7403d267be691560e31a121c441c06d765fef8450172d7201315924d86af52b9a098574d2c5be20ad66e0436aff85ccde5aa63b7ea2eb14f16523a72483b5757bc86da2753de2aede5e2396f839a3bd0d1dec1d0f40d5718337f29dc0890457edac4e72e9281133fd510d88e670dfbf2c29833b484259d75066db286cd45b4f2ef2971ec6572cc749548480c211711b96097a116e29834603fbc5c6d3a5f243db5d6226c9bb3711cddfaa69d54ce2e4e7be1666727e96030b602b4267f625709f59860915bafb5a21e42274c7045a487562f1475d0b7ec46f1139beb2ed1a7b7b4c1e5880c050a40ac90484d286a946142b4bc8dab02dc1cf30ccba3d4adc8590fc10f2dc0ef698ba3004d24d177c16e2fb53c8a2c08c17afb04a2bac4a099a8ba791c9690875268172100a4d7cd7e1a2659e4eb9224230a2dadf6a983c36efd60248bea25fb0d1da196c1c93a2fc06f0f73918aec07092d5eba0947f89cc5b0919592196c108240fbf9971735bad4e0e43fba7098c86ff49b5704d663d2c5cde925ae7441b53eb54dcaf91f9e8b017f8bd66744851c118c32dcc40f45bd4146405186f50f9f163fd538a7d26a90f679d9b9489d079cf74f080e2c5b249bb8b96b71fae0ed5db051e8ab95a21afc1632a6fe84a8597aeab9daef7d3220fc8298be04346aa8e8826855aac450d3d67dc4f66762488a335ce2e502fab63ece29f1f982b083a8fea960837a8e8055c892596c839c34040cba7dfd36fe683b4edec426ed70ad54907f9d2a0c0f7701eeeaeb908bd91e12b25c6137b9334cb3ab9088cad64d55a3ff0fefe0fb1002f4de154414bfc1dd2b880850de8d3b07b36eed3472e1da50f40167ec4771d64e64fe742bae89da948b443195568d471dc6877474783c8de7cc7bd24662a08db4cfc09faa784cdd99a2f2055508883c425af6e2bd0565febb23af0af76e6c4b47aa818e132401227b0366b749beff14b062af0ed03dc1e8db1e1adccc60e19d9369208e7a529e267f068bd3b7bf9b3263e7cfef065c18ebe91b25ee7f0122fc9f4a32b6e22f5f1a1702dd49c124b118feb0f714339a19d3fefbfb4f39dc8b9f4f846c1da4d25fe9d76d082e5f6237a10ee2add288f1cd15f7e3baafd9bf25836eaee0d635f33a62406440d770b1c6f83e49a8a59fac7614e5241cf208f180065bb6470cd33c8763f958801c03fcab9ee4afbd37250524ec82cd9413ac512cb10c7e75dc1deaaf6c0758b57b63f0ea2b9aeffea72ea5cb206a1cdead48b657311feb45a29bce5d27200bf08500f4594a11773ebd00cf03370395b010a6ebc95277711b65f13097f0eac32ddd68b177b444e470321fa8b71b8f8c85a7b2435517496b3690f210f83280a38e0f782365b800662fed77a00012673544412181b8bad0eee84e7bdcc45c70062db1205cc532425c8c78f634b6552ab6191c1efacc83828ea771edede3b7da9af34b584808e7c3ea3c268816cd3fd7351d5a160af8d9bb0af9e0798676766e71cd738ac83d57a46b3078943928a50b28e7a82c1b7517cb15c66d9c060fbe9e1880ffd80beb36452ae0390555ed0a0cf701e09f7d8b2cf4ad4216a4a9a158f18f871111e25094ed5b5c39020a5a5cc098d853a67000612c88d9e938ba7ee9331c7840e501eaa3e5ca7ccd6d711bb3cb201bdf65fc045c3eef8d82d2bf91e0628c9d01ee3327d005e55e50d8d30ae7e4eb2a1924d987c61843589be0a9824ba7d3bd1afd3f8a73ddd1e0ab092e9ddffefb76d47218b11988c105da66c47e9ab55a3a9a4aa9befa15c6d0a654e0da80801f1024208ca70dddc4ea9f9df8573158906d63db1e0e7de6329d77aeafd5bed6f577bfac3ae59c50e379b778263c4c456308d419b13c5bc18bfaff3c91716091935f4d75acc5dca2d62213a8f45340a8e872a9cddd3373c8c329f907b6d90dba9a67badb63aa3abab248840b653fc47715256042d71f990fa17fcb0871be993cab3f61d13665bf43ce32922d3d6c9ac0016f49046d683faad52e7996aece630e500f81316508465a2dd64f09f4d5140b4b3c1edc119be90cfb26b387f6ac14aef7a04a521ae5334f7bc17c3a874012409a678e0a0f0522b516ea8741abc9ed67868105d15471a95e22737b796656beeaee8176c8cc63c290c67e05a969fb8130656ae18514fb356b312cc2d7ebd1c443adfd79d69840ecf14df60a475413e6bddd3820a7313658e81dc39087a7e155626405efe211f2e60280d1f0577939a4818aa52955d26c0d49a9d975dc01eee166bf4580a93adf07392e4f18485f497ef7c10590a39a61b5026f3417e7eb6db4a8ade6bf02e34b6e25f6d8d09ad9a517fa95703b6b3bb0daa40981f9517ee72c0a0a1ec9290f8e092a7446c6cb56e377c3a7a99b64798434547142cb7fa66d6d7c8f4fe78c1d9b4e713a66dca4f6ffe20b0c2bdc9c673e8f964f12ca5c294f9da33508b12ca2afd38facb5c48694e301aa18ed0dfe0b7131ab8f002242bf95fc09e0c66607bcf85774daf0e1ed951921de06cee773cd28a1b11e4850c53b4a5e0ece665814ace4011aca810596e2d3b6b06ec721535d5e592f4ae9d6b3caa0bbb97af8365f32a4132ac8c9ccbe2586df51d8397708932a7ba7075a37b4d514eefebb24efd313cc82d41a502e56b6816e0177e4650d5148bccb24ceed109f90a10f6525e0afb21747e8a0e6e3c6bcaa43aa206d92f9e87f9c529ead50f7d725ea7a026989eda89671669f08be8ac3de79c06a589375efec31e04c87efbb1f968b603550777998ed4cf77e6b4a8159b42707e3492a4b37585600b9be7241e3bb77f7316d6eb3bb014d31161a1a3c1ac28c49e297dae89261f2a1c13ee202f32fa4021961f17b674a1c06d90896d11123a44d1961f8cc100252844a29f9d5c3a9256c1a24abf90eb6349dd7d1d047714ff855ae18b973fae0347ddc47bc8cd6f4135018fcd1315880136f1ad12a827db708423a80ca8bd1db03369e44423315e371ced34f02436b55bb41260d03a1b0574454699daa03cf4938b301dc271a287bc51cfef1bafd4e3e3909c22f154224864e7f4785cc12e50b0065ab306e8aa7120ca8af104fa3eccf811c248f05ca307ba775202bbf5c59b6e01b3f14e5c078a5453806eb02ce54f625603065d04e049d8e4d65c6f412db4ef0bc2c955235ee0e5dd5eda34c0d96a67e4cd889594be6fab50c676cd9a96496a656b30f6c982347cd9668abc1e9779c8c66e8880939e56bf34cacb4c66bff9b9f8d49a4873d3e7e9f339c00ee15675e748ceb26cdf0d5a5b53298f7c013379e4d83afa22dfa960ff22e5e5f455c23cd70e032a1cd5170d79e2c3e26fadca2892ba2703d14ea187ac1e808a1888683284fde277f31d84d37c1779cbac3cf6c0d06d98a77d23eeb0e6512bac2b157e8d0640335067209eede2c33e32044185ca76e83f398e2e0e2e03fc9787de5feb7f935c82e78ef94108663e5e12619e3ce677789765b43dbde1f7a639a0fffd229db8bfa6c6e6a9b41e7a6bd1c6cf9541711c24a2e1d7570dfa6acf3724676a629223690a3105b0edf32b87d42809d358c32f81cfa29813071d175b876f1598240d6fc455f71992f779d0838eefc21b0d5a87dd9eed74328d071cb299d232e5e584c931df99325e1f16686827dc64b266dbd5e2d4b5d68b1ac4c9de6a006ab7c1485cf639ecadf48bd2258d5c53948d7be156f311f14a3c08015d9b78e2fa16227be9005ab070e250dbcc7da4a006d9889d5ad9a072155f48272a3dc9b47b4d186a0abdeab5bbe438ee364132b7335ac381c4d404af19249fe022f442fb4519c98701788551e1b6097eb227a4a4208b6dabb30d40c70ab047881543735e46a843989a99d967afdf3322274e3004513ce1b618f8cd7938892170703a5afd76a4792511b8479445f9af62e26f3783e595cb12a87e1c0129a0221ecdb678e922489050e4f1cac00f4b2ac184796e4354db33820f13c5a443212d5bdd50f23f0cb76a6fb08ad3ebf2647c55ebe31f0913509ac4908c0b24bc814ef4e3b7426cad3e2cceb0a37b7a4a84eac6158045379b00f12bbdb82730a6202908ab9c0818622bf744a7c57b9284e892c7461856c559aa1fdc64cdaaa33444ca4acf063db3816d5f6fd6198c1d5112a9a37a43cd45c5aeb6fd3245b81d85655538012c27370cf597aa8fd7fe2184203209c2e6d6b2a91f426c41387c66a0833da58d32b1cd2c88cdf2a9957533e49f83b39f9f1f2f8b4d6924063341468b8e80298352ea5b29cfc9f8065c4924a9d7771433ae6c6f3efc6ef00d50e1d5c24427b36f89e715d3c1056e6f2b659afa6ab8984d2bd8ea776f2f17c97c578efdbd2d2267ce2a5e308778fc41b5eaac5e073f97c7bf27b1c44e287694637cab43005ee7151307767375f2ce3d9acd00e5aa847a7cc7ef4c3006015c508056138d51a20221acff6adfcf0e50e013bf40d39daa098c2a7bca236f868f1236b2ffc511efaf79efea99ab3f3ed91e3456dd01435b32a2f6e29275e8393542bacf52987be76371e45427fd86f703e37c22560211377ab56d7fbbb478d6ee9d91c9486d9c318fa54bd9d0c8cb8b3b7cabe8ed48f15f0a2331d2c896a52618cc4a078a833cb6bdf169439a6ca3a773d1e0e90d3ac46cc66ac60a2da5ed519ecc0b0b525949b79a0886a9b188f883606892a2c38bdbb2d9db142e07a1417cb86baff2605b41e2ddebc07a1f92caf7c9b1a2d3f75e30ef546097d27b9b124d91e50f3f13357f77bfd212ac9e564d733a2eebf7b294e27341465ca6ed0c3e989b4c49abe6a117b94220f5a10184d056e64e2b40655eb813367b8fe0444603511d74a5b80261f0f9775a7e6988718ddf3719e612a5644177cb8288e90dea3603df651969136e50384ee9e5538fd092b6f9e8ce3519e783320cf3c71bef28fea2b4cc1abcc8863b19d306cd75d1e7abcd8eb419345e3100538797fc01237ad8a7fff9175f1d32134c1e0050f56425f6050c22486768ad3cd03101beaf19492390e9c999fe7e628ffc7de291fd07234d97d166ca3c8f828b437a70ef3952d0cb64d498e4f95346c971400c9ce14a906f34164de0e3d70fdf05826d0ae0055d0beefe0cf2f96f85ee5a72a74ae2fc4b550a43ee2e33e8faac93bb5e3e81db9ac53d808b10b1c9f6cc95e2cb2d628abe119cf7c6a1e4a64169a0066df9d01860b3e8206295aa4e127bda7af495ee10cbbf0f92c35f520609a198b12682203dd6aa0473aa869155a5b3289cee9a0f5c73ed04316a221a4ebde2cab506d9318395e1ff077a3ed1c26b998553a9e321fbbe275f92c88b6b80662034a60d829799416e3adfb56718f96010afcd678295bc62b9b1b6345fe460508d45ff04f2f36b5c6f2b57b6f1ab0fd48490521555e6ac9030278465ebe0009f99fab1eb525db1800a2c25733012aa1bb41af8c64ab0022e6bf6d18071d24244a5d39481ef5587ffb677f060556b7703b69cf6ebb0954cb8f47fc0eef6002423f2a4c538b17898e99cf3d65ee9709d22a236ac41f7f00ad42e25a6133de44d95a9967106e92513cc2aca08a7b9124fe824379bc6e80962d3688da9c3369d087f01d03b12c71179230940e4a1f272978581516ad3c320868b49d4235fa239364829047ee985870b8b0"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={r7, 0x7309}, &(0x7f00000000c0)=0x8) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8, 0x4) r8 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r9, 0x4b72, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1032.080720][T10375] RSP: 0018:ffffc90018aafc60 EFLAGS: 00010202 [ 1032.116935][T10375] RAX: dffffc0000000000 RBX: 0000000000000010 RCX: ffffc90011714000 [ 1032.145430][T10554] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#2] PREEMPT SMP KASAN [ 1032.161054][T10554] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 1032.170196][T10554] CPU: 0 PID: 10554 Comm: syz-executor.0 Tainted: G D 5.8.0-rc3-syzkaller #0 [ 1032.180352][T10554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1032.191539][T10554] RIP: 0010:qrtr_endpoint_post+0x92/0x1010 [ 1032.197806][T10554] Code: 44 89 e6 e8 c0 52 50 fe 48 85 c0 48 89 c5 0f 84 c4 0e 00 00 e8 8f 67 96 f9 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 4a 0d 00 00 [ 1032.217947][T10554] RSP: 0018:ffffc9001b97fc60 EFLAGS: 00010202 [ 1032.224028][T10554] RAX: dffffc0000000000 RBX: 0000000000000010 RCX: ffffc90001cf1000 [ 1032.232373][T10554] RDX: 0000000000000002 RSI: ffffffff87dd4f91 RDI: ffff88808e1ca410 [ 1032.240950][T10554] RBP: ffff88808e1ca400 R08: 0000000000000001 R09: ffff8881e7c21ae3 [ 1032.249280][T10554] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1032.258908][T10554] R13: ffff8881eca0ae00 R14: ffffc9001b97fec8 R15: 0000000000000000 [ 1032.267241][T10554] FS: 00007fa3f0640700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1032.277160][T10554] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1032.283982][T10554] CR2: 0000000000743f70 CR3: 00000001e950e000 CR4: 00000000001406f0 [ 1032.292207][T10554] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1032.301068][T10554] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1032.309562][T10554] Call Trace: [ 1032.313140][T10554] ? __check_object_size+0x30/0x3e4 [ 1032.318743][T10554] qrtr_tun_write_iter+0xf5/0x180 [ 1032.327434][T10554] new_sync_write+0x422/0x650 [ 1032.332152][T10554] ? new_sync_read+0x6e0/0x6e0 [ 1032.337113][T10554] ? inode_security+0x102/0x130 [ 1032.342866][T10554] ? security_file_permission+0x239/0x470 [ 1032.351567][T10554] __vfs_write+0xc9/0x100 [ 1032.356455][T10554] vfs_write+0x268/0x5d0 [ 1032.361700][T10554] ksys_write+0x12d/0x250 [ 1032.366215][T10554] ? __ia32_sys_read+0xb0/0xb0 [ 1032.371265][T10554] ? check_preemption_disabled+0x50/0x130 [ 1032.377596][T10554] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 1032.384643][T10554] do_syscall_64+0x60/0xe0 [ 1032.392654][T10554] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1032.428325][T10554] RIP: 0033:0x45cb29 [ 1032.451250][T10554] Code: Bad RIP value. [ 1032.487561][T10554] RSP: 002b:00007fa3f063fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1032.508239][T10554] RAX: ffffffffffffffda RBX: 000000000050e0e0 RCX: 000000000045cb29 [ 1032.516756][T10554] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1032.526632][T10554] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1032.535049][T10554] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1032.543248][T10554] R13: 0000000000000d2a R14: 00000000004cf85d R15: 00007fa3f06406d4 [ 1032.552708][T10554] Modules linked in: 15:19:54 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x9, 0x0, 0x7}) [ 1032.602524][T10375] RDX: 0000000000000002 RSI: ffffffff87dd4f91 RDI: ffff8880919ef790 [ 1032.636773][T10375] RBP: ffff8880919ef780 R08: 0000000000000001 R09: ffff8881e7c23ae3 15:19:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x4dd90100, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1032.733015][T10375] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1032.764173][T10554] ---[ end trace ff54fd51f6049c13 ]--- [ 1032.770362][T10554] RIP: 0010:qrtr_endpoint_post+0x92/0x1010 [ 1032.778260][T10554] Code: 44 89 e6 e8 c0 52 50 fe 48 85 c0 48 89 c5 0f 84 c4 0e 00 00 e8 8f 67 96 f9 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 4a 0d 00 00 [ 1032.800823][T10554] RSP: 0018:ffffc90018aafc60 EFLAGS: 00010202 [ 1032.808546][T10554] RAX: dffffc0000000000 RBX: 0000000000000010 RCX: ffffc90011714000 [ 1032.808554][T10554] RDX: 0000000000000002 RSI: ffffffff87dd4f91 RDI: ffff8880919ef790 [ 1032.808561][T10554] RBP: ffff8880919ef780 R08: 0000000000000001 R09: ffff8881e7c23ae3 [ 1032.808567][T10554] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1032.808574][T10554] R13: ffff888086cc3000 R14: ffffc90018aafec8 R15: 0000000000000000 [ 1032.808584][T10554] FS: 00007fa3f0640700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1032.808592][T10554] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1032.808598][T10554] CR2: 000000000078c000 CR3: 00000001e950e000 CR4: 00000000001406f0 [ 1032.808609][T10554] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1032.808616][T10554] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1032.808624][T10554] Kernel panic - not syncing: Fatal exception [ 1032.810763][T10554] Kernel Offset: disabled [ 1032.909670][T10554] Rebooting in 86400 seconds..