878eb37eaa614213b83dd26e96d38d326adc04e9663cffaa8d39037b7a64f179fd8ff2f4a39d5ffdaa05d15668de509327356805c84b2f7a4ad5abe5d8c8d86aa6afded98e477b2afbcc5b7eb2087c76b3f960c5c1c04f47857f1a3d762e9d0f629c7421148c27444c3e84c3f2a4275d2e60bacc27728c0f1500fb86b473c69c94674f34b822de63fda70cdab5e70e539c1cf9b876264850342ac0d6b0838bc5caf"}], 0x110, 0x48800}, 0x24000054) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="6772706a71759f2478f64e6f74613d001c53a53b07c94504eafd197f83e63148b106b91418b79a015c171636d31ceb97bfc5d8e45b017ce56d1546c34e93eee10549383865b6db5fa753145f7929fe50eee9998f97e59c333ae70000"]) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000440)="5df860ca988b9d6d8b86cdf65ae2c712641300341171defc77bfab9169bfd83b1f6b38c891eaa878a6b1301d082d46b861ac89a04d97c98a151131c1c6dbba969b8d764811d26a6781110f075ffd126531916a0cbcea54ce88b8c21bc3320b874676e0aa71c4f777986cfe403aac65e6d43f88effdfa467c93f2b349aaea78002688264e", &(0x7f0000000180)=""/16, &(0x7f00000001c0)="9ab2dd621b4208f809cd4c98f4990105209e112e7ff9a2c2fa4f49e99952c3038d3cd17e92098ef8d589b53738b1a94535fcb22d42e3785c10c02d36d89f8f21cd8da70eba40da4a4452603ac64bd2f4bfae50616023620c8e44efbbe72776d9c7c36642b66430d2c0719058fc56318f37fcd139b792e44ead96667afdb6dd5ec1ac466b907797c92a649a2a859b8268409aaef27d1528e4e642aa210e8530a60780370822b42ba27a2fdc645667cdac5a8580d4b691d1a20b1c32f12ab8684c5014faaedcef64502e9801b229cd5ba9ca952e3b38f9f9ac96032dac0bbbe35eeb", &(0x7f00000002c0)="427c9ac111ec86f38270a57402f4c554554dbd282dd205e686aa620d1143b80d36658f0fc72876189b37f14375124225e3be1575b0ae03fb15a331c76bcd9427b65b06f3adcfaaeeecba87eb18e8f646c5d9c57525082b04bde80151d5824c616f054fe3c49eefa1c5b2314d6b84afb382a444916bd9262e39cb363bb475b6ac60b4a7a29d4ff3866df4b9", 0x4, 0xffffffffffffffff, 0x4}, 0x38) 06:16:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x4800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3365.073416] IPVS: ftp: loaded support on port[0] = 21 [ 3365.091688] IPVS: ftp: loaded support on port[0] = 21 [ 3365.108860] Enabling of bearer rejected, already enabled [ 3365.256179] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "grpjqu$xNota=" 06:16:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x4c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:52 executing program 5: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1100000, &(0x7f0000000000)={[{@noacl='noacl', 0x3d}]}) [ 3365.473979] IPVS: ftp: loaded support on port[0] = 21 [ 3365.483661] Started in network mode [ 3365.487990] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3365.507906] Enabling of bearer rejected, failed to enable media 06:16:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x6100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3365.534558] IPVS: ftp: loaded support on port[0] = 21 06:16:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x80400) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x14, r3, 0x4e559e2353b8c5d5}, 0x14}}, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) [ 3365.777698] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:16:54 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0xffffff7f, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:16:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x6300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:54 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd802) 06:16:54 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f00000000c0)) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x9, 0x5, 0x7ff, 0x4, 0x10, "7eba74912083b4366c656d00b3f70a00b72467"}) r3 = getpid() sched_setscheduler(r3, 0x5, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) kcmp(r1, r3, 0x4, r6, r0) [ 3367.759908] IPVS: ftp: loaded support on port[0] = 21 06:16:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3f000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:16:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000080)) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x8004, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r4, 0x1, 0x53, &(0x7f00000001c0)={0x7, 0x7, 0x2}, &(0x7f0000000200)=0x28) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="6cdffe46efc74186876ec5f091954ec532c95317a520f38e7c3bd12ad10801001593b190e0a51b4524aec4cc114f8e1e19d5cc679ce5ada97eddbc8b2423271fbd8975a126ab37a7354dee47dfcc4ba16cd11474ec889544ad17bdf15110049cb16dcfd37120b2f85eb81e058f77", 0x6e) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000100)={0x6, 0x800, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x20, 0x69d9}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1080000, &(0x7f0000000300)=ANY=[@ANYBLOB='grpjquota=hash,obj_type=seclabel,seclabel,uid>', @ANYRESDEC=r5, @ANYBLOB="2c7065726d69745fa30e0000000000002c00a0ade5068482c8a3e614feeb9a1b0b20ab9bb1a9958c2ae5f6c680b678c225411a74cfc65791f2e4725c1a03265deae127ace53d7ad5098d7feb68d0bcd321a4bc272ee478"]) 06:16:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x6800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3367.805370] Enabling of bearer rejected, already enabled [ 3367.950063] IPVS: ftp: loaded support on port[0] = 21 06:16:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x6900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3367.980779] IPVS: ftp: loaded support on port[0] = 21 06:16:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x6c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x6f02}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3368.304179] Started in network mode [ 3368.309381] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3368.342672] Enabling of bearer rejected, failed to enable media [ 3368.373450] IPVS: ftp: loaded support on port[0] = 21 06:16:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x7100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:55 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd803) [ 3369.386142] Left network mode [ 3369.516468] Left network mode 06:16:56 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0xffffff9e, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:16:56 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8004, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x8004, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000900)=@newqdisc={0x48, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x18, 0x2, [@TCA_CHOKE_PARMS={0x14}]}}]}, 0x48}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000140)={'gretap0\x00', r9, 0x8, 0x10, 0x0, 0x4, {{0x1d, 0x4, 0x0, 0x1b, 0x74, 0x68, 0x0, 0x40, 0x2f, 0x0, @multicast2, @local, {[@timestamp_prespec={0x44, 0x24, 0xfb, 0x3, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@local, 0x800}, {@remote, 0x3}, {@private=0xa010102, 0x9}]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x23, 0x5, [@local, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, @remote, @loopback, @dev={0xac, 0x14, 0x14, 0x15}, @remote]}, @ssrr={0x89, 0xf, 0xcd, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x78, r2, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x6}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x1}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0xff}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x6}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xc9}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000010}, 0x24000015) 06:16:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x7300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:56 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x40000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:16:56 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@grpjquota='grpjquota', 0x3d}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000100)=0x9) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x0, 0x0) readv(r5, &(0x7f0000002600)=[{&(0x7f00000002c0)=""/4096, 0x706}], 0x1) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) splice(r0, 0x0, r4, 0x0, 0xa004, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x8, 0x2, 0x1000}) 06:16:56 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd804) [ 3369.728783] IPVS: ftp: loaded support on port[0] = 21 [ 3369.765164] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3369.784914] IPVS: ftp: loaded support on port[0] = 21 06:16:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x7400}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3369.847328] Enabling of bearer rejected, already enabled [ 3369.861160] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 06:16:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x7900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x7a00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3370.045125] IPVS: ftp: loaded support on port[0] = 21 [ 3370.126209] Started in network mode [ 3370.129903] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3370.146412] Enabling of bearer rejected, failed to enable media 06:16:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0xff00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3370.180786] IPVS: ftp: loaded support on port[0] = 21 06:16:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x2}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3370.552607] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3370.571690] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:16:58 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0xfffffff0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:16:58 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd805) 06:16:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x3}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:58 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRES64=r0, @ANYRESOCT=r0]) 06:16:58 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x6094c2, 0x0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000100)) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, @bcast, @bpq0='bpq0\x00', 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8000, 0x6, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='grpjqqota=\x00']) 06:16:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x48000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3371.881681] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "grpjqqota=" [ 3371.911205] IPVS: ftp: loaded support on port[0] = 21 06:16:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x4}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3371.936967] IPVS: ftp: loaded support on port[0] = 21 [ 3371.955426] Enabling of bearer rejected, already enabled 06:16:58 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x4) 06:16:58 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x801403, &(0x7f0000000140)=ANY=[@ANYBLOB="7461696c733d739d5f072118412833b3052c7c86e963ee6d616c6c3d007a71b9088e5df019c6ef57d18d6e584fd65d2593ddbebf1398b10e2d12d43b9d122a215ba3f7326eeb4515ad1c84b7862324432957c768d231be99ce7cd951a268b5"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(r3, 0x1, 0x19, &(0x7f00000001c0)='wg0\x00', 0x4) splice(r0, 0x0, r3, 0x0, 0x8004, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000040)=0x1, 0x4) socket$xdp(0x2c, 0x3, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, &(0x7f0000000100)={0x2, 0x5965, 0x9, 0xf3bc, 0x6, 0x8, 0x6}) 06:16:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:59 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="626172726965723d666c7573683de365636c6162656c2c00"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) chdir(&(0x7f0000000140)='./file0\x00') r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)={0x2}) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) [ 3372.242917] IPVS: ftp: loaded support on port[0] = 21 06:16:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:59 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0xffffffff, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3372.394440] Started in network mode [ 3372.400475] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3372.431599] Enabling of bearer rejected, failed to enable media [ 3372.456021] IPVS: ftp: loaded support on port[0] = 21 [ 3372.478334] IPVS: ftp: loaded support on port[0] = 21 [ 3372.536974] Enabling of bearer rejected, already enabled [ 3372.572808] Enabling of bearer rejected, already enabled [ 3372.642302] IPVS: ftp: loaded support on port[0] = 21 06:16:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd806) 06:16:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:16:59 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x0}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:16:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xa}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3372.873065] IPVS: ftp: loaded support on port[0] = 21 [ 3373.128178] IPVS: ftp: loaded support on port[0] = 21 06:17:01 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4c000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xf}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:01 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='grpjuuota=\x00']) 06:17:01 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@jqfmt_vfsv0='jqfmt=vfsv0', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x0, 0x8, 0x81}, &(0x7f0000000100)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0xbac}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r2}, 0xc) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000280)={0x1, 0x1}) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r2}, 0xc) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[@ANYRESOCT=r5, @ANYBLOB, @ANYRES32, @ANYRESDEC=r8, @ANYRES16=r3], 0xfffffecc) prctl$PR_GET_THP_DISABLE(0x2a) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x110, r1, 0xdf5ea000) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x5) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000001c0)={0x4, 0xa, 0x2}) 06:17:01 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:01 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd807) [ 3374.123205] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "grpjuuota=" [ 3374.127835] IPVS: ftp: loaded support on port[0] = 21 [ 3374.139381] Disabling bearer [ 3374.159432] IPVS: ftp: loaded support on port[0] = 21 06:17:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f00000000c0)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x3c, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@typed={0x5, 0x6b, 0x0, 0x0, @str='\x00'}, @nested={0x34, 0x4, 0x0, 0x1, [@typed={0x2d, 0x68, 0x0, 0x0, @binary="284053c052b6d683566b8a00a091abac4860751cd0096bc4aa0ff9d180a833618b3d10879ba65ca104"}]}]}, 0x50}}, 0x20000001) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x10}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3374.306996] Left network mode 06:17:01 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) 06:17:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:01 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1900024, &(0x7f0000000180)={[{@jdev={'jdev', 0x3d, './file1'}}, {@tails_on='tails=on'}, {@hash_r5='hash=r5'}, {@barrier_none='barrier=none'}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}, {@data_ordered='data=ordered'}, {@resize={'resize', 0x3d, 0x1000}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'barrier=none'}}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xba, 0x4) [ 3374.525348] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3374.544934] IPVS: ftp: loaded support on port[0] = 21 06:17:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x2a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3374.653613] Started in network mode [ 3374.660741] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3374.671165] Enabling of bearer rejected, failed to enable media [ 3374.702324] IPVS: ftp: loaded support on port[0] = 21 06:17:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x60000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x3c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:03 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd808) 06:17:03 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$nl_crypto(0x10, 0x3, 0x15) 06:17:03 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0xa4, &(0x7f00000000c0)=ANY=[@ANYBLOB="6772706a71756f74611d7365636c4734656c2c00034fc98773c37777742a90850c8ae2e4fadcb390fde74446108a165206212a376f1f30719c2914fb6f3fbbc7d1595c7b05df36b826f10e17f8ec636ec934fa0162ffc518924f3948d981c3"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x8004, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, 0x140d, 0x100, 0x70bd25, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x24004810) r5 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x8004, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000140)=""/225, &(0x7f0000000000)=0xe1) 06:17:03 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3377.105804] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3377.109457] IPVS: ftp: loaded support on port[0] = 21 [ 3377.128709] IPVS: ftp: loaded support on port[0] = 21 06:17:04 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f00000000c0)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x48}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x4c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:04 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/net\x00') syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) [ 3377.510163] IPVS: ftp: loaded support on port[0] = 21 06:17:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x61}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3377.589826] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3377.630319] Started in network mode [ 3377.634143] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3377.664427] Enabling of bearer rejected, failed to enable media 06:17:04 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x823021, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) [ 3377.763339] IPVS: ftp: loaded support on port[0] = 21 06:17:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x68000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x63}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd809) 06:17:05 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x47}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:05 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f00000000c0)=[{{0x1, 0x0, 0x1, 0x1}, {0x1, 0x0, 0x0, 0x1}}, {{}, {0x4, 0x1, 0x1, 0x1}}], 0x10) 06:17:05 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nouser_xattr='nouser_xattr', 0x3d}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, r5}}], 0x30}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000100)={r5, @in6={{0xa, 0x4e21, 0x9, @mcast1, 0x1}}}, 0x84) 06:17:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x68}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3378.290563] REISERFS warning (device loop5): super-6503 reiserfs_getopt: the option "nouser_xattr" does not require an argument [ 3378.290563] [ 3378.303634] IPVS: ftp: loaded support on port[0] = 21 [ 3378.351938] IPVS: ftp: loaded support on port[0] = 21 06:17:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x69}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3378.630563] IPVS: ftp: loaded support on port[0] = 21 06:17:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3378.773573] Started in network mode [ 3378.781009] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3378.800925] Enabling of bearer rejected, failed to enable media 06:17:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x71}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3378.841895] IPVS: ftp: loaded support on port[0] = 21 06:17:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x73}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x74}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3379.082897] REISERFS warning (device loop5): super-6503 reiserfs_getopt: the option "nouser_xattr" does not require an argument [ 3379.082897] 06:17:06 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6c000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:06 executing program 3: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x80000d, &(0x7f0000000040)={[{@user_xattr='user_xattr', 0x3d}]}) 06:17:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x440, 0x0) write$FUSE_LSEEK(r4, &(0x7f00000001c0)={0x18, 0x0, 0x5, {0x4}}, 0x18) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r3, 0x0, r6, 0x0, 0x8004, 0x0) ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f0000000100)={0x0, 0x3f, 0x1000000, [], &(0x7f0000000140)=0x8}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) [ 3379.479166] IPVS: ftp: loaded support on port[0] = 21 [ 3379.533455] Left network mode [ 3379.542737] Left network mode [ 3379.555266] Left network mode [ 3379.560330] Left network mode [ 3379.597630] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3379.786412] Started in network mode [ 3379.790234] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3379.805539] Enabling of bearer rejected, failed to enable media [ 3379.828114] IPVS: ftp: loaded support on port[0] = 21 06:17:07 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:07 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd80a) 06:17:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x79}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:07 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x74000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:07 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x3, 0x80) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f0000001640)={0x1f, [0x8, 0x800, 0xfee], [{0x400, 0x9, 0x0, 0x0, 0x1}, {0x54, 0x3, 0x0, 0x0, 0x0, 0x1}, {0x4, 0x9, 0x0, 0x0, 0x0, 0x1}, {0x1, 0x9}, {0xfff, 0x2, 0x0, 0x1, 0x1, 0x1}, {0x3, 0x6}, {0xb00, 0x2, 0x1, 0x0, 0x0, 0x1}, {0x1, 0xfffffffa, 0x0, 0x1}, {0x1, 0x6}, {0xfff, 0x7f, 0x1, 0x1}, {0x400, 0x2, 0x0, 0x1, 0x0, 0x1}, {0x9, 0x5, 0x1, 0x1, 0x1}], 0x3}) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000001500)=[{&(0x7f0000000140)="29238ed27b40791d2bb0922a37d2165af7b6fffc770f50a0e8e7979d93c6aa2c5a3373650c5bc732e46786ce983edc1cbfc0234174f6e0417bcfbbc16249ed09efca33d95149ac0d4bc13621bc4bc8f662f89fdcc939f89fada6cc6473f3449d61cfb6ee935f93abfd5b4ea543df", 0x6e, 0x2d}, {&(0x7f00000001c0)="21635174d90f7bd547c5a20bb06c92c46b5405a20470810f594393824f2a7bb6cca2235aab638ce7ebffb52fa33cf894ef425e5862c8331f88f59985b7b88effef3b54f3a8d642acbc52a12d963dc2c18d67ba2a3c939fd01812d8e82af56dcdbd1908190debe7e1c632d58ac46cae690bd55b34fc9c78c9f183cf5df43e3fde7a88d6ff46ffa6313ec2a6664c90f4850a39999d161f71f8", 0x98, 0x4}, {&(0x7f0000000280), 0x0, 0x40}, {&(0x7f00000002c0)="0a1d945cddf46f8628bcb0dd3264f45f5f9c2156952972e941c2597e243996462488bed098cbcd79", 0x28, 0xfff}, {&(0x7f0000000300)="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", 0x1000, 0x1}, {&(0x7f0000001300)="47318c4f719edea473bd64f081037dabf7f29718d1ee7f7798c3e61f932da1e57a83cc55c15fc947f4ee4bc7c2848c05d6a96d163403a7ce65ceda81ead84b0e67913a02dfd80b3d6b8153e98b40ef4cb94b3764f2b07a812084200894f09e664de7f95e233b5522040c3c55c44503760907dfea867395f393c8e9abb73587764467666b79a93ec88d8d1326ca6ac2c3717502383351265f274450e9354209540e64a3343ca085c9afba5bc8", 0xac}, {&(0x7f00000013c0)="c226d70775e38b90a126c8d74b577613eaa6b20e162c0e7e554c2667620a0f91b3d8f428e23b64b0c2cfe1015c946859fffd8e9ef8f0156ec19123ca206501a2", 0x40, 0x7}, {&(0x7f0000001400)="3dd9b175acf679d440951df10824bbeea70acde7f2b50b00b24aeed8a98607421fbb77a350232d867e1979843cb37561ca7cd3d6bdb8fd693ff903942879f016efe62d43a53973b6990b2915599e9aa73d7825e554e61d6eab2e1ec9d1e7c6173bdfeed0e55aa16926092a2646781a133284364bb92c49528ff04761057f245ccca06d92b655246daa197aeb511b665956a120a71b97b5227bdc826862496cebe09f34c135b0eaa99444d132ab4a55b5bf82c6c69adafa9754c0b11d32c34caa3e28e9aa2361def4f46c3a2d97ba958f7c893a54ea9c4a228e5f7df4c894e48fdb293ec67235bbba095ddf7af58b77d4b552b4c6840802", 0xf7, 0x1}], 0x200080, &(0x7f00000015c0)={[{@shortname_winnt='shortname=winnt'}, {@uni_xlate='uni_xlate=1'}, {@uni_xlate='uni_xlate=1'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@shortname_lower='shortname=lower'}], [{@smackfshat={'smackfshat', 0x3d, '-'}}]}) 06:17:07 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) [ 3380.863023] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3380.889815] IPVS: ftp: loaded support on port[0] = 21 06:17:07 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800, &(0x7f0000000100)={[{@user_xattr='user_xattr'}, {@hash_tea='hash=tea'}, {@conv='conv'}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x38, 0x33, 0x63, 0x64, 0x65, 0x36, 0x35], 0x2d, [0x65, 0x38, 0x39, 0x30], 0x2d, [0x65, 0x37, 0x36, 0x39], 0x2d, [0x66, 0x30, 0x4, 0x64], 0x2d, [0x66, 0x39, 0x37, 0x66, 0x65, 0x66, 0x31, 0x33]}}}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x8004, 0x0) sendmsg$NFT_MSG_GETSETELEM(r3, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1f8, 0xd, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1a0, 0x3, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_DATA={0x14, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}, {0x178, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x164, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x4e, 0x1, "2a8bca9e86c0af4c55ef25374cf6f87ec9517732fdc666655d3b4b41dec3a15c70a335d24f5f856df1deed37e30f3b5510e392adeec871f2c5aff890dc047243ac292f677bbf81583b2f"}, @NFTA_DATA_VALUE={0xe0, 0x1, "a4080775446dbdc422260143da0a95fc5e4577dabc826baa6d0300d43d2b64bc6c9768eebdd6240afbec920ca5d70ea7a6ef25d4dd9caa82f18e71d0e19ed2e8c5c6e46dd8a12728dd1d8dd4107b02ccc5fe16918f90122a010cb28e2f6daebb36c96b6398fbce1a58d51a3e8e2290c2f7ca8e4dcb83e13910091c597ccf2dc652b2ee2dd5e5daed9aef75339bb8b8df3d4e2f4a2cd9c337ea5f3ec074cabd998d92f8da0b217c94993da0a169d95b57927e5087331dd4589647844b2f29d0b7c610679ca15b100ede0f84629f181bdafa9c1147b6679adbd7ec1e95"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x40}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 06:17:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3380.930891] IPVS: ftp: loaded support on port[0] = 21 [ 3380.950567] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:08 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@barrier_none='barrier=none', 0x3d}]}) [ 3381.049482] Enabled bearer , priority 10 06:17:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x26f}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3381.179419] REISERFS warning (device loop5): super-6506 reiserfs_getopt: bad value "none=" for option "barrier" [ 3381.179419] 06:17:08 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup(r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000001700)={0x7, 0x0, 0x81, 0x400}) syz_mount_image$ocfs2(&(0x7f00000000c0)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000001600)=[{&(0x7f0000000140)="18b1d7b78657f589b4807ea9f8d0c60194a20e45a1c2eb4ade32898f96f3b41a7ee6437e128834c17fbd05c4cf8b18351ebb61cffaed46646acd5a4e46d7049776a1373bf01315b9f1ed266e3181cbe0e0131ff1de5e8653371f41f9cfacdd3375ad9ace53b223f49fc197f51c85677d95702ff3c751de493fbdc4bbd5c7dc56095b3c", 0x83, 0x832d}, {&(0x7f0000000200)="9e2047ddb598da795e7dd5270f6c39608f31f616f17eb758f38128fee41a9e5520a7d06b592a2270fafc18a65fbfd7aeb00f0fcfdb77fb9b2c2ff958934283dadfb8e40083744397", 0x48, 0x8}, {&(0x7f0000000280)="060496ba490cd20c6ee697cff65fa199e34af2c60fb40d1f1f515cece280a9de268f38412e5f1d41bdbc8af0ae18b8d43c70acbe3d1f2fbee149606f40073b10332bb999259e7eaa52f1c177ab19b94ac04d0457fe9fe4d10710db5e7fc9218fd221bf4122665904da0d0632399b1f924483798cc8e2b492c96d21c0f3e5fb6603b93efdd79a7a7905dba2dd47bf4202075a1d96429fcc8c10c3f9db33b2a86c2b3a3880c1e588126b4fc66c31e732f1589f930b4b6b403a202136e3201dc71ad5b40e6658cbce4ca643e01bb1ed837ac2a159ea51f097a43dbf16", 0xdb, 0xfff}, {&(0x7f0000000380)="71949dfc07411f56dae0705906518c5bec1e4592dbf7091a09561aa46a0c32c3cd30dd803397fa41cdb293a4753f4a50952ce47483d83be4978bdd", 0x3b, 0x3}, {&(0x7f00000003c0)="8d13b031c024581480b3954a2b5192cf57b53d476e03c90b57020189ac378229d996f867cf7d2c2f4fbe55a21ccd407bd826bb0fa7706624a38cb2aee045616903bfc4897a31c9084ba9e936397571a53970d6e02c96163b6bb708c89c2a6480690c885322a23e9cdecc2d054de00c1d3b3c654fbad566d65636b621d803d9c1b254c1d142b7e0f78133856059f4e190df7658cfba94c77f2e0af6f0163542875c534fda12240a8f4f", 0xa9, 0x9}, {&(0x7f0000000480)="aa2cd2fa7b005caabc2f57f517068520434ac8325fd8e8159b77110047426a645befdb5080dd1a96b537365d5be7979cb2650f363bc6b8c98b63438a541079660b57deb06c215039ecf4", 0x4a}, {&(0x7f0000000500)="3c6704003ac9b2293365b7c33dc67ccbfd0dad49668317ec2e64a55afa2d0acaf2e16d41c6970b8e31e2b96dadbbf76c70e143b32145510a56c3eb5d65d91387460d52de9dcf08bd86d7a574f0fa6e89231120765cb272e77139227867d48fe7f72c60d1dbafce10a827b586d94a933e4b56e8c362a97aad12f7e69f737e8ac78e2e26c765ee20211684bb79d6a2be92ba659c30c1800187545545a27b5a3b95ba835f01f42fe612738d707dde18f71a25c0709a060a06f6530224b36cbb00c4af0775d7c2c09facc48a758b5aa651ac530dc20d928a9182c6b149810828f377c73fa2", 0xe3}, {&(0x7f0000000600)="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", 0x1000}], 0x200c80a, &(0x7f00000016c0)='^\x00') [ 3381.242626] IPVS: ftp: loaded support on port[0] = 21 06:17:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3381.373145] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3381.455590] (syz-executor.5,20981,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "^" or missing value 06:17:08 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x2}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3381.501692] (syz-executor.5,20981,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 3381.517300] Started in network mode [ 3381.521199] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3381.543611] Enabling of bearer rejected, failed to enable media [ 3381.581344] IPVS: ftp: loaded support on port[0] = 21 [ 3381.677435] IPVS: ftp: loaded support on port[0] = 21 06:17:08 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd80b) 06:17:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x500}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3381.737323] Enabling of bearer rejected, already enabled [ 3381.952857] IPVS: ftp: loaded support on port[0] = 21 06:17:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7a000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:09 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6772706a71756f74613d008045570ac7d296b6e91bb5bf07e4e038dba90775a4a9e6e717ef35bebb3ba5e31eb96a5404975757d54c0d064b78e8016dcd1e21c4569601718345d93ff808fd053f183c748a63061f389cbe34b1cc3b36fd41f3e0d463291fded3751856836a98b29295f9a6fcd9d931c22b5340de60e413e6dfa503dd931b187a7fec99124f16005a5d8a50bdd3da00bc8b0686751d83abc2c62529bb6a235eedb8ceec7ce48a7b00a3465534d627ab54e1134ed47d195ae0fea0295d7be31c14bce5"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0x0, 0x1, 0xff, 0x1, 0x81}, 0x81}) 06:17:09 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x22000, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000100)) 06:17:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x600}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:09 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x3}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3382.256427] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3382.272262] IPVS: ftp: loaded support on port[0] = 21 [ 3382.286420] IPVS: ftp: loaded support on port[0] = 21 06:17:09 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000000c0)) [ 3382.316551] Enabling of bearer rejected, already enabled 06:17:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x700}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xa00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:09 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd80c) [ 3382.619881] IPVS: ftp: loaded support on port[0] = 21 06:17:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xf00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:09 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x4}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x1018}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3382.832288] Started in network mode [ 3382.836526] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3382.869535] IPVS: ftp: loaded support on port[0] = 21 [ 3382.870506] Enabling of bearer rejected, failed to enable media [ 3382.893311] Enabling of bearer rejected, already enabled [ 3382.935226] IPVS: ftp: loaded support on port[0] = 21 [ 3383.099046] IPVS: ftp: loaded support on port[0] = 21 06:17:10 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9effffff}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x1800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:10 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100040, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000be08f8b96540bbc4e3568fec88ae6894ef7c8fa7f85fbd4384a817160e8d40533409d4ef9860dec577d3b3c27b30753dbdc8d9e3d4ee2f2074c5514065fb21f972fb6271bf2de691008ab624184a0bc2c5548ffc60722d009844e25637526d914216f217e8896059b549141865ab85486130c6d4bf5b48a5b5b669ce5dc5f48e8a5f5add387eb6a1014c93dcdf4a1aa32cf784f347163f9608f16f54912405054ab89f86efd73d1e07599fc1c3288c1a0c6653000000000000"]) prctl$PR_SVE_GET_VL(0x33, 0xa256) socket$netlink(0x10, 0x3, 0x15) 06:17:10 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3002, &(0x7f0000000000)={[], [{@seclabel='seclabel'}]}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x408100, 0x0) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000100)={[{0x8, 0x800, 0x1, 0x0, 0x3, 0x9, 0xb9, 0xaa, 0x3f, 0x80, 0xff, 0x9, 0x3}, {0x80000001, 0x8, 0x4, 0x8, 0xf1, 0x1, 0x77, 0x0, 0x0, 0x1, 0x3f, 0x59}, {0xe0d, 0x3, 0xfc, 0x8, 0x7f, 0x80, 0xff, 0x3, 0x39, 0xf0, 0x7, 0x7, 0x4}]}) 06:17:10 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @multicast1}], 0x10) [ 3383.483220] IPVS: ftp: loaded support on port[0] = 21 06:17:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x1810}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:10 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe002) 06:17:10 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x2000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3383.728460] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3383.834991] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x2a00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3384.047926] Started in network mode [ 3384.052878] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3384.082796] Enabling of bearer rejected, failed to enable media [ 3384.128295] IPVS: ftp: loaded support on port[0] = 21 [ 3384.434550] Enabling of bearer rejected, already enabled 06:17:12 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x5}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_pts(r0, 0x391100) splice(r3, 0x0, r2, 0x0, 0x8004, 0xd) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000000c0)) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) fstatfs(r6, &(0x7f0000000100)=""/102) 06:17:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x3c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:12 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket(0x10, 0x803, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r7) r8 = gettid() sendmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r8, 0x0, r7}}}], 0x20}, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x2400, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xab3}}], [{@obj_role={'obj_role', 0x3d, ':!@'}}, {@fsname={'fsname', 0x3d, 'grpjquota'}}, {@hash='hash'}, {@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r10}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@measure='measure'}, {@dont_hash='dont_hash'}]}}) 06:17:12 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe003) 06:17:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xa7ffffff}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3385.566235] Left network mode [ 3385.572508] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3385.591038] IPVS: ftp: loaded support on port[0] = 21 [ 3385.614788] IPVS: ftp: loaded support on port[0] = 21 [ 3385.645929] Enabling of bearer rejected, already enabled [ 3385.685563] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "/dev/kvm" 06:17:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x3f00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3385.695622] Left network mode [ 3385.709687] Left network mode [ 3385.764645] Left network mode 06:17:12 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x4000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3385.990894] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3386.019130] Started in network mode [ 3386.022940] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3386.023629] IPVS: ftp: loaded support on port[0] = 21 [ 3386.040591] Enabling of bearer rejected, failed to enable media [ 3386.075029] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3386.099466] IPVS: ftp: loaded support on port[0] = 21 06:17:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x4800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x8004, 0x0) sendmsg$AUDIT_USER(r3, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x1010, 0x3ed, 0x400, 0x70bd2a, 0x25dfdbfd, "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", ["", ""]}, 0x1010}, 0x1, 0x0, 0x0, 0x40050}, 0x40008800) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) splice(r6, 0x0, r8, 0x0, 0x8004, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r6, 0xc100565c, &(0x7f00000000c0)={0x2, 0x8, 0x2, {0x1, @sliced={0x2, [0xb4f, 0x8, 0x101, 0x3, 0x1ff, 0x6, 0xff00, 0x1, 0x16f, 0x101, 0x5, 0x4, 0xcd6, 0x6, 0x400, 0x2, 0x9, 0x4, 0x8, 0x8, 0x9, 0x5, 0x4, 0x0, 0x5, 0x7f, 0x0, 0xf1, 0x6, 0x8, 0x6e8, 0x8000, 0x3, 0x6b6, 0x2, 0x4, 0x40, 0x2, 0x5, 0x49a5, 0x8, 0x6, 0x81, 0x20, 0xfffd, 0x2, 0x8, 0x7f], 0x1fc0}}, 0x8}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000ff07000039d4fcc5e2d553585e20cb9444d707753ba920728cb4d591ca6e408189d70450f0caf5a1eece9d4ff9ee4ba14eab5a3c0089ab790000a6059d025e219fb5fb1d"]) 06:17:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x4c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3386.466447] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:15 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x6}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe004) 06:17:15 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xb1210000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:15 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="c65db9cf585e391121df4d562672269f86e6ddd9"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x40, r4, 0x20, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x2402a414}, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000008c0)={0x149c, r4, 0x209, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_WANTED={0xf8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf4, 0x4, "50570a36ad28be83901addf344f71fd8d719dce481dcab553fbc8285b9cb9e4be2cece455e9db3339e99422509f0c04e4c241ff206bf825ada957bc32c0b815bc2140ae173e869c241fb5eeff0901b600f673bdbc2ef5cbffc01479960cf745bacfdc4a689379d5ca05d92fb55a87f624c19960f3efb2581e69344c6958b782ed8d4a18cda76546babc05388e7da81fc29684d4fae492c32d16cf1b4ff616cf44dce1f7000c02eed924dfb3abc7b08103838072e6aaea1284a0b7563b1da7d4b7f1127e73f2c21b9b13e10f8cda64f8ed7633208614f23d923af3df5c655205b064e3966aa5bb44b7abbf8e93a1326ea"}]}, @ETHTOOL_A_FEATURES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x190, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc3, 0x5, "ea2129253a2dcd838e1abf7988c2e536346f0d69ef14a690b5d999b91e033739d2793efd03e26555aae77eee2c04502af4b91490bb9b9a9e19a110e18914e2eea8be7e0b23117f6a36e54d17e4910d75e9a98eb017236ae9ecec372ccaa8fd392a525173709e28b7ba4ceec7780a62f56ae1cfe1a4664f50539a30c2ad086a78c2051bbfe9aacbecc4bfb57e1243b8a78cab91a1dda523c3ddfdf76ca59aca8fb2194301924f1a0c778b99e30ab0ad5c4216f4c16af390e8cc8e6e19298dfc"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xbf, 0x5, "86a68068a652ccbdf931e2a39ea47d1af7d4d242e8abde393d74224ac215836b535eba2e40893911dc66035ea406e0fe672b4d0b38e034c1ce3eb82d65ec950f4712946d940221b6caeb77d41ea27c7a4b20c18f679b9228d8744a3f785033d9f1a1314cc193a836c1538d48ea749b2b437df454bbb29c4536e64e37e4ad68e950b3f5cdaf78817e4f1cff6c2635e0c9e3dfaf3d379236ad0a8743ca2d69349250cfbfd2994752bb9d1d5d8cd6217729064e442407eae3ca8937c3"}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x148, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x140, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x87d}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/vim2m\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'net/raw6\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x718c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '/.+[\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '{-:!$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x1024, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x18, 0x5, "0bd3cb7d7648ecae9f85efdef9b7151ea0b9eb15"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xff4, 0x5, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x65}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}]}, 0x149c}, 0x1, 0x0, 0x0, 0x40000}, 0x810) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r4, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7000000}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008040) splice(r0, 0x0, r3, 0x0, 0x8004, 0x0) ioctl$SNAPSHOT_POWER_OFF(r0, 0x3310) lsetxattr$security_evm(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@ng={0x4, 0x1, "4e8ced20a145af28590c38a1a89261bf46116b"}, 0x15, 0x1) [ 3388.304181] IPVS: ftp: loaded support on port[0] = 21 [ 3388.323686] IPVS: ftp: loaded support on port[0] = 21 [ 3388.331241] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "]X^9!MV&r&" 06:17:15 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000100)={&(0x7f00000000c0)=[0xfa, 0x3b0, 0xbd7f, 0x1], 0x4, 0x9d, 0x9, 0x20, 0x6, 0x10000, 0x800, {0x0, 0x0, 0x5, 0x7, 0x200, 0xeb, 0x200, 0x82b3, 0xfe00, 0x401, 0x14b9, 0x2, 0x2, 0x10000, "75a8fb9bc62362f5e4e24cfed4c1b1b54765858d7be438804d016b9760234eb8"}}) 06:17:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3388.352414] Enabling of bearer rejected, already enabled 06:17:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3388.655694] IPVS: ftp: loaded support on port[0] = 21 06:17:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3388.739110] Started in network mode [ 3388.743047] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3388.762450] Enabling of bearer rejected, failed to enable media [ 3388.789289] IPVS: ftp: loaded support on port[0] = 21 06:17:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:15 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x7}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3388.970556] IPVS: ftp: loaded support on port[0] = 21 06:17:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6f02}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3389.021680] Enabling of bearer rejected, already enabled 06:17:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe005) [ 3389.090904] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "]X^9!MV&r&" 06:17:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}], 0x38) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000140)={0x88, 0x2, [], [@jumbo={0xc2, 0x4, 0x1}, @enc_lim={0x4, 0x1, 0x7}, @ra={0x5, 0x2, 0x8a7}, @pad1]}, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x0, @remote}], 0x10) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000892e5c9c028e2c9173b2c1c358cb000000000000b8d2d8635f000000"]) [ 3389.275905] IPVS: ftp: loaded support on port[0] = 21 [ 3389.404334] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:16 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xf0ffffff}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:16 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) recvfrom$unix(r2, &(0x7f00000000c0)=""/88, 0x58, 0x40000102, 0x0, 0x0) 06:17:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) splice(r1, &(0x7f0000000000)=0x7fff, r2, &(0x7f0000000200)=0xd87, 0x3, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x8004, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000140)={0x7fffffff, 0x2, 0x3f, 0x9, &(0x7f00000000c0)=[{0xa42, 0x2, 0x2, 0x7}, {0x3, 0x0, 0xee68, 0xa912}, {0x51, 0x2, 0x8, 0x800}, {0x80, 0xff81, 0x5, 0x3}, {0x100, 0x9, 0x7fff, 0x1}, {0x2, 0x3f, 0xe5, 0x4000}, {0x1000, 0x9, 0x8, 0x1f}, {0x2, 0x75c, 0x0, 0xffff}, {0x101, 0xc7, 0x8, 0x1}]}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6772706a71756b74613d009c72858ccbce689b8108d00f4f38ecfe528135a4f951e601fa304ebb1a621dc375d3e5c3dd3025d9056e9ba4c1e984334de7ef61da53aae7c1ad74847c7995dd6dd1a77c5dda27dcb2dafdd440b29ce6f4e6be36ef9d1477cb31af729f3dbe"]) 06:17:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7400}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3389.672945] IPVS: ftp: loaded support on port[0] = 21 [ 3389.725018] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "grpjqukta=" 06:17:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7a00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3389.946917] Enabling of bearer rejected, already enabled [ 3389.982070] IPVS: ftp: loaded support on port[0] = 21 06:17:18 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x8}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe006) 06:17:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xff00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:18 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xe75, 0x9, &(0x7f0000000780)=[{&(0x7f0000000140)="1b2901d68869905ce83c962183781c035048c4cd35c441ca338fd0171525e93405d800c1641c45453976be5fd37f81a5210c659f85", 0x35, 0x6}, {&(0x7f0000000180)="9591ca8b9c006e6a8437a6c7f939a9036a46d83c9bca67133a3fd679c7b7b1b56f1dc78936f9cc55caadcf7e8c0344624a69c2ec9d7df4d95f3669e8483b49d98ed4decb75b182d00eb5f39f1bb5c2c452114e58f5b9361cd3ab721e948a1d55db4ec85250965a0f6416026264868714243f583600a17379e07f586fdac6d1af867ec5ba8593fe787bda90b5e231a4c858d850a1a5bc6c7da81b48707b51c99ab70111974eba73ab6f6e24c90d81fc6208d53220e2d69ea5584a6384051c75bb99e85de4156b4ad3377425ca5ed2fec35858f3bb2f91264c4b74a6c1dcaaa2e72dd4102a115bac1ddaf425", 0xeb, 0x1}, {&(0x7f0000000280)="4ba7de02bf1261c826b8b322f75f9d1ea43c7363790f7a806c47d42bfebce76c1ba2202ee52e6692af63eeda8dc9080683e36c345dc632e2a4ab70363dfd7ebc0af6798265ddd790b2539e622f3966fa5085b95dc7b6b6312953b8642d56c5a413ee5ba795309596c3fefd2ac0abb5c18f64a977e4bf5b320d24a0d8384800ba45a5b09f91cc51705cbd53b63a79d81fb3791a95086af9ac6d54d4b00c9f0b073911b8d184695cb3", 0xa8, 0x266}, {&(0x7f0000000340)="34bfc07c95e5a69d016d1deb195e77f5918d91016d4fa8cbe6c1100a41a6a5ae4ad7cfe27abfea57fd9e0a88cffe3cac3944246dbdd73dcdad8d90f54def273f864bc58e93d569bf63b4ea83c5de1ef0169bcc4f86652289ab4caac19c82b8e640e8576a2235df2e2563bb7d551d28acaaea018580068599ef64ced6f202951d78a898768a4fce45857152a9cd594e47b1a1f99e91657175c3865b263184950bb7dd9faa22100671b371e1b0df8707b5253ef4fb48bca4673f4ef6f8", 0xbc, 0x20}, {&(0x7f0000000400)="8ed06c02677099e7508bf678e3b7bb3922eabeda10f600d137b311fb7b4c604bdd73a1209e1ffd66759ca7537acb715342e8b72d6284eb6a81b8bce2c786780978696f34fb25023bf57c6dd8086a329a2a6fc3f2dcbbe63e69f4d104f5a39363d2d530e00b016841424819272b5628525486bb06831dcf4354923a25b51eb423a008e1950565e197f3ab94bd2e670dfe0f27325a1ab5fc1b1499919b8509f11994e61eebb321dce17f58568b9933baef275154eabf4c19616b887280e25e2750dfd9835c47bdc2912193bc69c31c3f3766fa702db24662d4dfb5fb658c951fb1cd679e87e99f4bce7d2b730e76f0007349c8ba93abd17fcf", 0xf8, 0x8}, {&(0x7f0000000500)="7bb50479923e0bdd64fe05c5af3e0d44cda7f2be468f30799f6b34f82bd5aaea9ddecd5af4170d75bcdc2d2d93605923f0fe31120350d785f7b6fa55051b3081a37c96a11b5bb94a907d6f146377f71c0ecc77669af5a6dac4cb5a26e4bdc7c665a84f109c2b25bca0830ea57096", 0x6e, 0x1a7b754f}, {&(0x7f0000000580)="f4bc62ae309650d4bfa95a6c132328d77c654b0baa1e7b68d110b1f54ae965a4ceb0df547eabfcf2a5ad28a07806ce5a930a2a1f2d877741c25fcde0fcbe6383862da32e5b7bad7ad97f4ef2f4481b179d17c2b6a4501cfe8dac8611ed3d0bb1b9611a082f51b014a0265d2417360b41f2cfcb9632dc1c85d35613eb31aa3ccd87636c5c65e11236", 0x88, 0x4}, {&(0x7f0000000640)="9cf72f6e641b24ce75014ef3de6114fddffa1b7d6d48b598939ced782f9838fdd3eeb3e69a24", 0x26, 0x810000}, {&(0x7f0000000680)="52e8e50a320b7c34f66fe584e501b60dfe6b2094f916793e48e3d5ef11549bad35ffc8f341b3f0abde3979cd0b8f8e2b50c1d2099c7901e84f672921922bf6f354940920bdf70ed27761b1c80618ea4e249c0fdc79a2e993bc76d7bcf1fe8ea990394712922227f3d14145ac1a4d255b203b89e7beb045276268a0055b5e45374f640f20c2c1eb4a16f240d8e16400a6cc9f55ce8483ce01009585d210c48b70a9d83c77d55973bc076f428c77ced5ff5c4e1f496f3c50bf3cd38078da145220da846b51a023f6b06bf242c70c0e8bbb26deee058f20d03a87a763ad6a698a912469af51c34274ae4f85ab3b9c23a51f73b785418a87ecff8d", 0xf9, 0x8000}], 0x1008, &(0x7f0000000880)={[{@lockproto_dlm='lockproto=dlm'}, {@nosuiddir='nosuiddir'}, {@quota_account='quota=account'}, {@quota_quantum={'quota_quantum', 0x3d, 0x1ed}}, {@errors_withdraw='errors=withdraw'}, {@data_ordered='data=ordered'}], [{@context={'context', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}]}) 06:17:18 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x0, 0x0, 0x300060, &(0x7f0000000000)=ANY=[@ANYRESOCT]) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) connect$phonet_pipe(r1, &(0x7f0000000200)={0x23, 0x40, 0x7f}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) close(r1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x8004, 0x0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = dup2(r5, r1) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80040, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r7, &(0x7f0000000400)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRESOCT=r4, @ANYBLOB="004025bd7000ffdbdf0001000b17ae2c7326e53d668200000000"], 0x28}, 0x1, 0x0, 0x0, 0x40008c0}, 0x40001) sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r8, 0x400, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40) setsockopt$inet6_dccp_buf(r4, 0x21, 0xd, &(0x7f00000000c0)="2d8b27b49e508be8a091fd98a1410f1a91b61851cf243928b53208c53b5305c67ec52ca09e1ab6d2dae1156a4e882e79e0721b595b1648e93410943d52e113bf5093808f7e97a4610df430a70901c7c58795e18977dae49253324e71f0bc9a6c8540acdebbce0eb8eb182e4eaf492d62087899e0c9e8f011ebee6dde9dcf485027119b1b72d2b3bba9991c58eab8b6c9ce785eb86848135d5e4ab3c2784cd4ad8bfec0a96fcee7abe802124990fcd3ef7e458ecf8dde0dc7aa34de030a43f13870105fe2f48c8a046b0161127999178305c39a4e034cc66954cc30", 0xdb) 06:17:18 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfc000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x100000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3391.793784] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3391.832472] IPVS: ftp: loaded support on port[0] = 21 [ 3391.849911] IPVS: ftp: loaded support on port[0] = 21 [ 3391.858310] Enabling of bearer rejected, already enabled [ 3391.882721] Left network mode [ 3391.948704] Left network mode 06:17:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f00000000c0), 0x8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x2000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3392.115062] IPVS: ftp: loaded support on port[0] = 21 [ 3392.171570] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x3000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3392.289924] Started in network mode [ 3392.293939] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3392.305375] Enabling of bearer rejected, failed to enable media [ 3392.324223] IPVS: ftp: loaded support on port[0] = 21 06:17:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x4000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3392.385621] Enabling of bearer rejected, already enabled 06:17:21 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x9}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x5000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:21 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6772706a71756f743d87979a89c8425e656c2c000dbc1f34522e7fb025de97bfff460e3c3523a07cdc7c1cbb992f032198c7fbe5334c7f05119a2316bb3d887bab4e2bcd49a9cf5edb1d579b9bb3d7e333c7ecdd030034e25114ace549b15e091eaf941cf4f2c1a67ff621a2f7d9bc7451d53acfc540a390866d563fee82bb92ec3a0543b42c230df557d69a6e3407e642711b9766f50551a3a1cc0e579db6283d9fc5411d7aa65f3a7c4a2ee50e54454b93f14ee605fa7abc4e00000000"]) 06:17:21 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe007) 06:17:21 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX]) lsetxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x9, 0x200}, {0x7, 0x10001}]}, 0x14, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0, 0x3ff, 0x10}, 0xc) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) inotify_init() r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x8004, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@map=r1, r2, 0x9, 0x2, r5}, 0x14) 06:17:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfe800000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3394.771520] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "0xffffffffffffffff" [ 3394.808472] IPVS: ftp: loaded support on port[0] = 21 [ 3394.825060] IPVS: ftp: loaded support on port[0] = 21 06:17:21 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20008, &(0x7f0000000100)) 06:17:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3394.849463] Enabling of bearer rejected, already enabled 06:17:21 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffd3, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@grpjquota='grpjquota', 0x3d}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x34, 0x38, 0x66, 0x65, 0x61, 0x66, 0x66], 0x2d, [0x65, 0x31, 0x30, 0x66], 0x2d, [0x66, 0x57, 0x39, 0x37], 0x2d, [0x61, 0x31, 0x37, 0x30], 0x2d, [0x30, 0x66, 0x35, 0x57, 0x35, 0x31, 0x27d642e1e67b115c, 0x38]}}}]}) 06:17:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:22 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) 06:17:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xa000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3395.141933] IPVS: ftp: loaded support on port[0] = 21 [ 3395.331244] Started in network mode [ 3395.335134] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3395.351060] Enabling of bearer rejected, failed to enable media [ 3395.372042] IPVS: ftp: loaded support on port[0] = 21 [ 3395.575440] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "0xffffffffffffffff" [ 3395.623432] Enabling of bearer rejected, already enabled [ 3396.596286] Left network mode [ 3396.846266] Left network mode 06:17:23 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0xa}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r7, 0xc208ae62, &(0x7f00000000c0)={0x0, 0x0, @ioapic}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="67726f74613d7365737c6162656c2c00000046baae2ef8777da13087fdf785f3379cbbea31abfe5aa3d948c17dfa50767d6576cf2154182db485090ebf26920477945e47c5574e42faafebccb2ea525691b25620c6857b33cbf9367ddae5dd9132e60f8b0c8a69caefaf61593128ae1ccbba3999a741bc62eead470dc2c460363081a3"]) 06:17:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xf000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:23 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6772613d00000000000000cf0253c40a984b93204242ba03eb3680be13c1aa62d153285ee734a2dd69bd5cfde02df5566bc1db83abdce1"]) 06:17:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe008) 06:17:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfec00000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3396.962054] IPVS: ftp: loaded support on port[0] = 21 [ 3397.018865] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "gra=" [ 3397.031631] IPVS: ftp: loaded support on port[0] = 21 06:17:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@replayonly='replayonly', 0x3d}, {@jdev={'jdev', 0x3d, './file0'}}, {@data_journal='data=journal'}], [{@fowner_lt={'fowner<', r1}}, {@obj_type={'obj_type', 0x3d, 'defcontext'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, 'replayonly'}}, {@hash='hash'}]}) [ 3397.094272] Enabling of bearer rejected, already enabled 06:17:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x18000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:24 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) 06:17:24 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) pipe(&(0x7f00000000c0)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0x14b) r2 = socket(0x10, 0x803, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r4) r5 = gettid() sendmsg$unix(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) lchown(&(0x7f0000000200)='./file0/file0\x00', r1, r4) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$SIOCX25SSUBSCRIP(r7, 0x89e1, &(0x7f0000000100)={'netdevsim0\x00', 0x2, 0x5}) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) splice(r6, 0x0, r9, 0x0, 0x8004, 0x0) getsockopt$MISDN_TIME_STAMP(r9, 0x0, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 3397.403390] IPVS: ftp: loaded support on port[0] = 21 06:17:24 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x800, &(0x7f00000000c0)={[{@grpjquota='grpjquota', 0x3d}]}) [ 3397.503119] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x18100000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:24 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0xb}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:24 executing program 3: socketpair(0x23, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f00000000c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6772706a71756f52613d7365636c6162656c2c008af0b8e1c69fcadc4c70b4ccbd4c9f61ae506de4b93de390309da351a77b796787414fd49578b68d26a1d57a618679a78165b79e78046a0dfb2620f2c59847804814e8f7e7dbf51baa5b736297bd483cbcfec82e5083c5bf926cd6d3"]) 06:17:24 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3397.653780] Started in network mode [ 3397.658396] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3397.687562] Enabling of bearer rejected, failed to enable media [ 3397.721965] IPVS: ftp: loaded support on port[0] = 21 [ 3397.737165] IPVS: ftp: loaded support on port[0] = 21 [ 3397.755148] Enabling of bearer rejected, already enabled 06:17:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe009) [ 3398.005718] IPVS: ftp: loaded support on port[0] = 21 06:17:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfeffffff}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x20000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:25 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='iaXel,\x00'/20]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r0) r1 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, r0}}}], 0x20}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@initdev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f00000001c0)=0xe8) r3 = socket(0x10, 0x803, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r5) r6 = gettid() sendmsg$unix(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) splice(r7, 0x0, r9, 0x0, 0x8004, 0x0) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000000200)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x0, r0, r2, r5, 0x2, 0x2}, 0x0, 0x0, 0x203, 0x8000, 0x5, 0x4, 0x3f, 0x80, 0x4, 0x12, r10, r11}) [ 3398.138802] IPVS: ftp: loaded support on port[0] = 21 06:17:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x2a000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3398.257756] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:25 executing program 5: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8808, &(0x7f0000000000)={[{@hash_tea='hash=tea', 0x3d}]}) [ 3398.384749] Started in network mode [ 3398.390676] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3398.408565] Enabling of bearer rejected, failed to enable media 06:17:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x3c000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3398.462372] IPVS: ftp: loaded support on port[0] = 21 [ 3398.544919] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "hash=tea=" 06:17:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x9}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x8004, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000200)) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x3f000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3398.850144] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3399.515524] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:27 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0xe}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:27 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe00a) 06:17:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x40000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:27 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) migrate_pages(r1, 0x4, &(0x7f0000000600)=0x8, &(0x7f0000000740)) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="23c66efadf9137f01bc6a53a5fd2b7b0d9fd88e58742522f244f3c3fa514c0c16a", 0x21, 0x10000000}], 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB='nobarrier,fragment=metadata,max_inline=8%0x8-16t1\x00,check_int_print_mask=0x0000000000000000,compress,degraded,user_subvol_rm_allowed,fsname=seclabel,euid=', @ANYRESDEC=r0, @ANYBLOB="2c6673636f6a3d243c0220c33c771573797361646d5f752c00"]) r2 = socket$caif_stream(0x25, 0x1, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x8040, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000580)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000005c0)=0x10) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={0x0, @vsock, @l2={0x1f, 0x3f, @fixed={[], 0x11}, 0xff00, 0x2}, @nl=@kern={0x10, 0x0, 0x0, 0x100000}, 0x2, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)='nr0\x00', 0x400, 0x1000, 0x401}) syz_mount_image$ceph(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000300)="a20dd9f0acc1fbe11ea30fb39dfe9eba31357e03f51fdd", 0x17, 0x8001}, {&(0x7f0000000400)="ebd4ab7d3439d0c17e3b2a65c203edbb136c6eb875fc4e30e32b606f38ceb42bf32fd6ccb9e0700b691ffd9df5685fa6554c5334c7de6fbd48a4c546fcd3d208c2be96ba685dda3d2c5420090b6573132187539c78529542af9375e4e7de3606d11a909800d3245573f0f5bacc43631152facad3f3509632160c722768ff36a70576f77d456ea6a7dcbb70aa1fa79f981a380aed21a5842e37dbae7097e55af248a81282476e6cfafb7570af379f491d4af003b4a3a2f8f24c4358", 0xbb, 0x8}], 0x80, &(0x7f0000000500)='*{)]%\x00') 06:17:27 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xff000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:27 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x1c, r2, 0xab9535e9a6578fc1, 0x0, 0x0, {0x5}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x2000c094) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000900)=@newqdisc={0x48, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x18, 0x2, [@TCA_CHOKE_PARMS={0x14}]}}]}, 0x48}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) splice(r7, 0x0, r9, 0x0, 0x8004, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r9, 0x89f1, &(0x7f0000000240)={'syztnl2\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x8000, 0x40, 0x81, 0x7ff, {{0x40, 0x4, 0x3, 0xd, 0x100, 0x68, 0x0, 0x94, 0x4, 0x0, @empty, @multicast1, {[@lsrr={0x83, 0x27, 0xb5, [@local, @remote, @private=0xa010100, @multicast1, @loopback, @empty, @multicast1, @remote, @empty]}, @generic={0xc, 0x7, "87a94315bd"}, @cipso={0x86, 0x15, 0x0, [{0x2, 0xa, "78e21888daddbdf2"}, {0x5, 0x5, "79b3e5"}]}, @cipso={0x86, 0x44, 0x3, [{0x6, 0x8, "ad106e19de81"}, {0x5, 0xf, "70657b781ddfd6b8f7fc54a618"}, {0x5, 0x6, "e4dfc359"}, {0x0, 0x5, "b89ff6"}, {0x5, 0x4, 'Jt'}, {0x7, 0x7, "81f7049562"}, {0x2, 0x7, "1d3f49f44a"}, {0x2, 0xa, "939bac841425a623"}]}, @rr={0x7, 0xf, 0x69, [@private=0xa010102, @multicast2, @empty]}, @timestamp_prespec={0x44, 0x54, 0x81, 0x3, 0x5, [{@private=0xa010102, 0x3ff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x771}, {@empty}, {@broadcast, 0x9}, {@multicast1, 0xffff}, {@local, 0xffff8001}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x6}, {@remote}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0xeb4}, {@multicast1, 0x9}]}]}}}}}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WIPHY={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x40081}, 0x44040) [ 3400.419765] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3400.439895] IPVS: ftp: loaded support on port[0] = 21 [ 3400.462191] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3400.475640] IPVS: ftp: loaded support on port[0] = 21 06:17:27 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6772706a61b6aadd9fcd7365636c61625f6c2c00"]) r0 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x100800) recvfrom$unix(r0, &(0x7f0000000180)=""/141, 0x8d, 0x10122, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e) modify_ldt$read_default(0x2, &(0x7f0000000340)=""/137, 0x89) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f00000002c0)={0x3, 0xffff0001, 0xfb8, 0xff, 0xfff, 0x10001}) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000300)={0xb, 0xa91abcec77307c3a, 0x3, {0x1, 0x6, 0x7, 0x20}}) 06:17:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x48000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3400.560219] Enabling of bearer rejected, already enabled 06:17:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x4c000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3400.786420] Enabling of bearer rejected, already enabled [ 3400.825641] IPVS: ftp: loaded support on port[0] = 21 06:17:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x61000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3400.833915] IPVS: ftp: loaded support on port[0] = 21 06:17:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x63000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3400.978404] Left network mode [ 3401.043177] Left network mode 06:17:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x68000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3401.195733] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:29 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0xf}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x69000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:29 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffff000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:29 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) readlinkat(r0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/87, 0x57) 06:17:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe00b) 06:17:29 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000780), 0x0) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x7, &(0x7f0000000640)=[{&(0x7f0000000140)="42020b57dbb2eba8c805d2015981753ed578dea44e085d8aee8ed00865b94fde52f7c78c368e9b87c93f34f2003ca8a23d44e702e90f81ff69df3741a4018978091c56534b0db3501a6acc603b62ba847ba55c480ac9ab8329d6909dba9ad92dfef51869955307c592e8abd29f83979090ca04556e14ec1cc1df2840c8bf99f1b821c295203a00fed4b3c570170e3a83d471d0e809c3fe2fffe9eeed4aa510e3e11b790061285c841c2fdfaa78d5c97c33ad020fad", 0xb5, 0x1}, {&(0x7f0000000200)="174b19ba0d4ff50c52d442bd147658e78a5e6f5baa85d3ab383d70ff513a529e6af76e1b09c44e19d8d30f3d57f4ec70a4cff7e84c6ed99b4544b49a13dfdbe0e3c128d851111a67ec76d0e1341012519b0be3f95ae1a79c9acc0ca71f852dfd6456cfe663fb53f3bd48b66fe74ecd6f2ae7113652667fab455d4f39", 0x7c, 0x3ff}, {&(0x7f0000000280)="fa86cddbf0ed6acb26c1d5f5f4e7642b2cba6ae51231755a918b22c2f2e462a2d62b43d44abe6c61ca6c52b0799a92774572b4addb72dbd4314125a1ed8c30a52e160ed59d6df64a8ce2c0009d131d98be0daa372f56ed138822c5b12bbd2364229e1f2df843b07a92ae99f4f41980f12470dd1b1fc6b2b641900467d2cec28607265c256e2e6e0354222216ab786961c301d8bb1ff585b9e6d59cd80f3d21af0cb51a8c7a9cba076878c7335f235e497c198a827769", 0xb6, 0x5}, {&(0x7f0000000340)="8ca304364be2cef0c4da5522192710bb22877d4e1e990ecd3f063221e8e7da31f429feb49ba3718685b51881fb3f7d7c02ec5a4331828a31f761b1e3b07d8067f1825915d0f8c73ee74981d007ede0a819b1", 0x52, 0x6}, {&(0x7f00000003c0)="a69c360e7a5b32a92a663783961dd0bbf97a2d92e5a43831b9db817b7a4c31d5adfb32d3d20b0058ec893ed2a94348633c1b082441614a90c9748c30001d569cd6d682cd86c18a151c39ee1258b8eb807058e0e95d286baf39c9c06ba8e9d97c6c860a2f6834cd2118760a8d063023e4599b61142f87ff635f8d8a5d9471118bef4e2c94eae1b09c308a24582212bc1dca387e57edaa129311937ff5bfde8aa99ca4f555", 0xa4, 0x8}, {&(0x7f0000000480)="7d7ab2defb85cc95d6d4391dcfbf510745f9ca4a3ce3eb1b9f31732a762fd6735b706e518b547d8a087345498c9fafd15fd4e0e286d7ef6b1f6637ec970cb1a85c0a569a6e4f569d53554d78503df033b0163d7bd8fa285cb0eaae09806ac391b2b921f8a9d9b7af87a9853e2b030b0dd31d622978da7fa82af73b731e94b52e7438c302a1bcfcc8a1fdb91c36aa5208ea1706928167daacc0916287f746c4fb5a0cf00ac167fc9758c37ba9ee4148f458f76ae960db02e302ab500cce520ff5033ff2", 0xc3, 0x5a38}, {&(0x7f0000000580)="5de8be3ae2a3feb88bdc87b61c142f088da3983232de08d57b31ec9587f4ce34ef97ce8f5269a930535a4408186836f734319f22b8213b232e528f49b686c43528eaa0999a7991b2c75c993da708e055c778646b68f8b940370d3db6dceb93d8f2d84b178f63d6443a5227e182836a3cab65ecec4e7d9c8d3f673352c65b4be189ca32de81bf38247bb201a7a7d91b54733c167e0601562e", 0x98, 0x80}], 0x1138000, &(0x7f0000000700)='\xa4(\x00') [ 3402.177332] IPVS: ftp: loaded support on port[0] = 21 [ 3402.189462] IPVS: ftp: loaded support on port[0] = 21 [ 3402.199129] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3402.224921] Enabling of bearer rejected, already enabled 06:17:29 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6772706a71750000060065636c6162656c2c00"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="900e000030003deb0000000000000000000000007c0e010078e2996d8fc50e010200000100706564737400000064d952b9c30e02"], 0xe90}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x200}}], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x2, 0x20d, 0x71a8, 0x86}, &(0x7f0000000100)=0x10) 06:17:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6c000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:29 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000000)={0x0, @capture={0x0, 0x0, {0x6, 0x7}, 0x8000, 0x800}}) 06:17:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x6f020000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3402.515525] Enabling of bearer rejected, already enabled 06:17:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x71000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3402.708820] IPVS: ftp: loaded support on port[0] = 21 06:17:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x73000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3402.760491] Enabling of bearer rejected, already enabled [ 3402.789634] IPVS: ftp: loaded support on port[0] = 21 [ 3403.002659] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:31 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x10}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x74000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:31 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe00c) 06:17:31 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffff7f}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000003740)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r3, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x400) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r3, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vxcan1\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004040}, 0xc4) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:31 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = getpid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000080)={0xa00000, 0xfffffff7, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98091c, 0x4, [], @p_u8=&(0x7f0000000000)=0x6}}) getsockname$tipc(r3, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10) sched_setscheduler(r1, 0x5, 0x0) setpgid(r0, r1) 06:17:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x79000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3404.561019] IPVS: ftp: loaded support on port[0] = 21 [ 3404.572303] IPVS: ftp: loaded support on port[0] = 21 [ 3404.620940] Enabling of bearer rejected, already enabled [ 3404.664698] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x7a000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x85ffffff}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3404.857704] IPVS: ftp: loaded support on port[0] = 21 06:17:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x9cffffff}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3404.921490] Started in network mode [ 3404.932535] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3404.944975] Enabling of bearer rejected, failed to enable media [ 3404.993077] IPVS: ftp: loaded support on port[0] = 21 06:17:32 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x60}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x9fffffff}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3405.071987] Enabling of bearer rejected, already enabled 06:17:32 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffff9e}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3405.155328] IPVS: ftp: loaded support on port[0] = 21 06:17:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xff000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3405.192293] Enabling of bearer rejected, already enabled [ 3405.212572] IPVS: ftp: loaded support on port[0] = 21 06:17:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe401) 06:17:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xffffff85}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3405.436298] IPVS: ftp: loaded support on port[0] = 21 [ 3405.445675] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:32 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="67f0d0e7489afa4ed7"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) fcntl$dupfd(r4, 0x406, r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx\x00'}, 0x58) r6 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x8004, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000000c0)=0x7, 0x8) 06:17:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xffffff9c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:32 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11]) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x10001, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r4, 0x0, r6, 0x0, 0x8004, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r6, 0x11, 0x2, &(0x7f00000001c0)=""/41, &(0x7f0000000180)=0x29) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000000)={0x200, 0x4c}) [ 3405.656213] Started in network mode [ 3405.659186] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3405.659914] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3405.687641] Enabling of bearer rejected, failed to enable media [ 3405.720032] IPVS: ftp: loaded support on port[0] = 21 06:17:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0xffffff9f}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:32 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3405.967143] IPVS: ftp: loaded support on port[0] = 21 06:17:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x2}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3406.042435] Enabling of bearer rejected, already enabled 06:17:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x3}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3406.133642] IPVS: ftp: loaded support on port[0] = 21 06:17:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffffa7}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x4}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0xc) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x8004, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x2, 0x1, 0x401, 0x0, 0x0, {0xa, 0x0, 0x2}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x1}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x24048001}, 0x20004010) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(r2, 0x0, r7, 0x0, 0x8004, 0x0) setsockopt$inet_mreq(r7, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @broadcast}, 0x8) setuid(r1) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000a28, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@fowner_gt={'fowner>', r1}}]}) 06:17:35 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe802) 06:17:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:35 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x2}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3408.792010] IPVS: ftp: loaded support on port[0] = 21 [ 3408.818366] Left network mode 06:17:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3408.904704] IPVS: ftp: loaded support on port[0] = 21 [ 3408.920042] Enabling of bearer rejected, already enabled [ 3408.920402] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x6}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x7}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0xa}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3409.191956] IPVS: ftp: loaded support on port[0] = 21 [ 3409.230353] Started in network mode [ 3409.234706] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3409.246267] Enabling of bearer rejected, failed to enable media [ 3409.272469] IPVS: ftp: loaded support on port[0] = 21 06:17:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0xf}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x10}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:36 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffff0}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:36 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@barrier_none='barrier=none', 0x3d}], [{@seclabel='seclabel'}]}) 06:17:36 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe803) 06:17:36 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x801400, &(0x7f0000000080)=ANY=[@ANYBLOB="5c72706a71756e88000000", @ANYRESHEX=r0, @ANYRESOCT=r3]) [ 3409.718717] IPVS: ftp: loaded support on port[0] = 21 [ 3410.070394] Started in network mode [ 3410.074322] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3410.084010] Enabling of bearer rejected, failed to enable media [ 3410.106629] IPVS: ftp: loaded support on port[0] = 21 06:17:38 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f00000010c0)={[{@grpjquota='grpjquota', 0x3d}], [{@obj_role={'obj_role'}}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="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", 0x1000) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) read(r3, &(0x7f00000011c0)=""/4096, 0x1000) 06:17:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x2a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:38 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 06:17:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffe}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:38 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x3}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe804) 06:17:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x3c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3411.583376] IPVS: ftp: loaded support on port[0] = 21 [ 3411.603611] IPVS: ftp: loaded support on port[0] = 21 [ 3411.632271] Enabling of bearer rejected, already enabled [ 3411.641717] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "20d281db9982314d", "85acebeae68cb54a5ecb9272a95a814fa42cb29c3fd659899c4b06206ef22f88", "c77e9495", "7984311bbbbe7d23"}, 0x38) 06:17:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x48}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x4c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3411.978923] IPVS: ftp: loaded support on port[0] = 21 06:17:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x61}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3412.146531] Started in network mode [ 3412.150871] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3412.167731] Enabling of bearer rejected, failed to enable media 06:17:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x63}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3412.201220] IPVS: ftp: loaded support on port[0] = 21 06:17:39 executing program 3: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:17:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x68}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe805) 06:17:39 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffffff}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3412.772620] IPVS: ftp: loaded support on port[0] = 21 [ 3412.984008] Started in network mode [ 3412.989176] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3413.007336] Enabling of bearer rejected, failed to enable media [ 3413.032551] IPVS: ftp: loaded support on port[0] = 21 [ 3413.084679] Left network mode [ 3413.099959] Left network mode [ 3413.113925] Left network mode [ 3413.129617] Left network mode 06:17:41 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x4}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x69}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x8003, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000100)={0x7, 'vcan0\x00', {0xaf0}, 0x8}) 06:17:41 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) r3 = accept$ax25(r0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) getsockopt$ax25_int(r3, 0x101, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe806) 06:17:41 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x3, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3414.219570] IPVS: ftp: loaded support on port[0] = 21 [ 3414.225433] IPVS: ftp: loaded support on port[0] = 21 06:17:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x6c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3414.270764] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3414.296610] Enabling of bearer rejected, already enabled 06:17:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x71}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3414.506824] IPVS: ftp: loaded support on port[0] = 21 06:17:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x73}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3414.616053] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3414.635200] Invalid UDP bearer configuration [ 3414.635235] Enabling of bearer rejected, failed to enable media [ 3414.685225] IPVS: ftp: loaded support on port[0] = 21 06:17:41 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x5}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x74}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x79}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3414.908287] IPVS: ftp: loaded support on port[0] = 21 [ 3414.959888] Enabling of bearer rejected, already enabled 06:17:42 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe807) 06:17:42 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x8, &(0x7f00000000c0)={[{@grpjquota='grpjquota', 0x3d}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}, {@balloc_test4='block-allocator=test4'}]}) 06:17:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x7a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3415.034845] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x1207, 0x0, 0xfffffffe, 0x6, 0x0, 0x4000000, 0x4}, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x80047441, 0x770006) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gr=\x00']) [ 3415.197448] IPVS: ftp: loaded support on port[0] = 21 06:17:42 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x40100, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) [ 3415.327718] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "gr=" 06:17:42 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x8, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:42 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r0, 0xc2604111, &(0x7f0000000180)={0x8000, [[0x4, 0x1, 0x2, 0x4, 0x3f0, 0x5, 0xcc0e, 0x6], [0x8, 0x8, 0x788, 0x1, 0x4, 0x0, 0xd7, 0x9], [0x6, 0x2, 0x4, 0x2, 0x4, 0x15, 0x3f, 0x8c5]], [], [{0x7, 0x3, 0x0, 0x1, 0x1, 0x1}, {0x4, 0x2, 0x0, 0x0, 0x0, 0x1}, {0x1, 0x401, 0x1, 0x0, 0x0, 0x1}, {0x6, 0x20004, 0x0, 0x0, 0x1, 0x1}, {0x8, 0x5, 0x1, 0x0, 0x1}, {0xffff7fff, 0x8d, 0x0, 0x1, 0x1, 0x1}, {0x9, 0x40, 0x1, 0x1, 0x1, 0x1}, {0x1, 0x2, 0x0, 0x0, 0x1, 0x1}, {0x6, 0x5, 0x1, 0x1, 0x1, 0x1}, {0x0, 0x9, 0x0, 0x1, 0x1}, {0x9, 0x2, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x2, 0x1, 0x1, 0x1, 0x1}], [], 0x6}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) [ 3415.450809] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "gr=" 06:17:42 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x20, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/840, @ANYRESOCT=r0, @ANYRES16]) [ 3415.621204] IPVS: ftp: loaded support on port[0] = 21 [ 3416.022111] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3416.039879] Started in network mode [ 3416.052993] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3416.080445] New replicast peer: 0000:0000:0000:0000:0000:0000:0000:0000 [ 3416.103974] Enabled bearer , priority 10 [ 3416.136074] IPVS: ftp: loaded support on port[0] = 21 [ 3416.218952] Enabling of bearer rejected, already enabled [ 3417.111795] 32-bit node address hash set to faff1eac 06:17:44 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x6}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:44 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @private=0xa010100}, {0x2, 0x4e21, @rand_addr=0x64010101}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x200, 0x0, 0x0, 0x0, 0xff, &(0x7f00000000c0)='dummy0\x00', 0x5c, 0x2, 0x2}) 06:17:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe808) 06:17:44 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0xa, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:44 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x880, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x8, 0xb3, {0x54, 0xc8, 0x0, {0x4, 0xf8b2}, {0x7, 0x2}, @cond=[{0x8b, 0x8, 0x7d7, 0x10, 0xce21, 0x80}, {0x5, 0x21b, 0x800, 0x7f, 0x8, 0xfff}]}, {0x57, 0x7, 0x200, {0x8000, 0x42}, {0x0, 0x7}, @ramp={0xd62, 0x80, {0xf000, 0x0, 0xfffa, 0x8001}}}}) [ 3417.331555] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3417.343746] IPVS: ftp: loaded support on port[0] = 21 [ 3417.348890] IPVS: ftp: loaded support on port[0] = 21 06:17:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x3}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3417.380206] Enabling of bearer rejected, already enabled 06:17:44 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x100, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@notail='notail', 0x3d}], [{@smackfsdef={'smackfsdef', 0x3d, 'grpjquota'}}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x8004, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) poll(&(0x7f0000000400)=[{r1, 0x4}, {0xffffffffffffffff, 0x8450}, {0xffffffffffffffff, 0x5012}, {0xffffffffffffffff, 0x4010}, {r5, 0x2}, {r3, 0x8000}, {r7, 0x8004}, {0xffffffffffffffff, 0x1}], 0x8, 0x3b9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3}}]}}, &(0x7f0000000340)=""/142, 0x32, 0x8e, 0x8}, 0x20) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000340)={0x9f0000, 0x23a, 0x3, r8, 0x0, &(0x7f0000000300)={0x13017bf, 0x400, [], @ptr=0x7}}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000000)="cfc598945311d7bd6ccbc8bfa48dc605ec6e62fd0b822755520fc1669b1a38", &(0x7f0000000100)=""/162, &(0x7f00000001c0)="f3e7589609c268c8b6d6a9e89ded5d5f617708ead001c0cf836d52fd27af4bd1c4eec7fba4985fd021195d71bda07f79a0656eafa9d6a540a65d243c5e0fdd884b496f68b16e350fce4118d68a8d215b72c673cf47d3101bc0b06877f7f8a5e1d194dc", &(0x7f0000000240)="1a9eb8f899762832f9c30b196c2dfd5b0068476c09d25e84a781e71f1604992f5c6534abf75e9642eafb3b8a0306b9dba1f82f16cfcc15c06226c72da90a620db1c247b7814507d3ca019bb0a85f3f03e902617d0f1820fbe9a463189abe38880337174f9268ff9be64ef327040ed411a2e501ededf362cea892d6ea7a780ab56fd6dc43f886ad17d5341327295eb2c15624eec1661a1ef6f435d3b44909c25c9060536e4bcc09", 0x80000001, r9, 0x4}, 0x38) 06:17:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3417.688974] IPVS: ftp: loaded support on port[0] = 21 [ 3417.805656] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3417.817704] Started in network mode [ 3417.821748] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3417.832190] New replicast peer: 0000:0000:0000:0000:0000:0000:0000:0000 [ 3417.840008] Enabled bearer , priority 10 06:17:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x6}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3417.863040] IPVS: ftp: loaded support on port[0] = 21 [ 3417.877487] Disabling bearer [ 3417.882102] Left network mode [ 3417.923777] Left network mode 06:17:44 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x7}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x7}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3418.025131] IPVS: ftp: loaded support on port[0] = 21 06:17:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0xa}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3418.089530] Enabling of bearer rejected, already enabled 06:17:45 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6772706a71756f74613d00a7fababb4918337dfd5ea7f3c0b981c22ebc255e4c3fa8a456846fedde5dae2063465da3452e88b73eb3b801dedd26102f284959ea15b4900203077b143ee7c5150381ae1a3e59e55476d17e691d0076cd956f5046eaa9aa87fa44475d86c1955b470b6cab54103e251201e0"]) 06:17:45 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe809) [ 3418.167050] IPVS: ftp: loaded support on port[0] = 21 [ 3418.264292] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:45 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0xd, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0xf}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:45 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x10, &(0x7f00000000c0)={[{@errors_continue='errors=continue', 0x3d}]}) 06:17:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={r0, 0x5, 0xfffffffffffffeff, 0x5}) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e23, @remote}}, 0x0, 0x0, 0x3c, 0x0, "500c81d92af0267140c277866f936a858629b98472b13f685590e9aa9c2ac4b55e06ca5aad9715388423df73dc7e872196880c153dc0efa363b478fc4ad62c392bc42546cb60d397ced8af9cfe245bdd"}, 0xd8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x10200, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x7, 0x1f, 0x703}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) write$FUSE_DIRENT(r4, &(0x7f0000000280)={0x100, 0x0, 0x4, [{0x6, 0xcd0f, 0xac, 0x100, 'R!`\x88\xfa\x8c\xb0\xcc\xd9\x04\xd8m.\xff\x97\ni\xd0+\x91\xa1p~\xc3\x16\a\x15rt\xc3\xfc\xd1\x8cbVnX\x92e\xf5\xa5\xb5Hs\xcd\xaf\xf0F\x86\xece_\xe9\x9e\xb6u@%\x00\x8c\x0e\xe2\x7f\x9d\xab\x14\xa3\xf6\xeb\xd3 \xac/y{A\x83\xf5\x8d_\xc7\x9b\x02b\xf3z\x97UO\"B\x81p\xc1U\\\xef\xf9f\xa0\x94Z\xd6\xef\xb8\xe8\xc0\xdf\xcaU\xcdE\xc0\x9b%0r\x83HE\xb7:JG\x1a@B\xff\x00)\x1e\x9e\xf9e1i\x1e\x15QtF\xa5\xd4\xbd\xb7\xc3\xc1\xd4\xe4\x17\x93\xfaD\x89\xff\xfctK\xc7\x19Wn\xe2\xc1\xb8\xf9\x95\xdbu\xc3S\xc5'}, {0x0, 0x9, 0x9, 0x3, 'grpjquota'}]}, 0x100) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000001, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRESHEX]) 06:17:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:45 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x8}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3418.556491] IPVS: ftp: loaded support on port[0] = 21 [ 3418.564416] REISERFS warning (device loop5): super-6506 reiserfs_getopt: bad value "continue=" for option "errors" [ 3418.564416] 06:17:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000200)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000080}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r1, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_VERSION={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000000) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='j']) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x200000, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) ioctl$FBIOGET_FSCREENINFO(r2, 0x4602, &(0x7f00000000c0)) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) [ 3418.674540] IPVS: ftp: loaded support on port[0] = 21 [ 3418.692657] Enabling of bearer rejected, already enabled 06:17:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x2a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3418.903829] Enabling of bearer rejected, already enabled [ 3418.921886] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "j" [ 3418.968535] 32-bit node address hash set to faff1eac 06:17:46 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe80a) [ 3419.060788] IPVS: ftp: loaded support on port[0] = 21 06:17:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x3c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3419.225918] IPVS: ftp: loaded support on port[0] = 21 06:17:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x48}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:46 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x25, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:46 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00\x00\x00']) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x54, 0x8, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4800}, 0x8801) 06:17:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3419.626596] IPVS: ftp: loaded support on port[0] = 21 06:17:46 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, r4}}], 0x30}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r4, 0x5}, &(0x7f00000001c0)=0x8) r5 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x8004, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000000c0)) 06:17:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x61}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3419.799329] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3420.106397] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3420.115428] Invalid UDP bearer configuration [ 3420.115465] Enabling of bearer rejected, failed to enable media [ 3420.143694] IPVS: ftp: loaded support on port[0] = 21 [ 3420.555045] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:48 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x9}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x63}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe80b) 06:17:48 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r1, 0x8982, &(0x7f00000000c0)) 06:17:48 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="676f7461ff0000000000"]) getxattr(&(0x7f0000003800)='./file0\x00', &(0x7f0000004880)=ANY=[@ANYBLOB="73798835656d2e2a407d272d5e232d7da426285efb3a00f52b86d279d4561fe1eca147df67ec37b501916bcb77fd0fbeb7f98757506497474014bfb4c9ca1cdfc1639efbdb789dc8816381ad70f5eb68bd57ae8d6dfde9dba5caa2bd8e4ec44f0e82fe3647cf4c60ced5a25c6961b8cd94fe1b929a8d8e38b188500c5d6785364babdca5bbd27937313e8159b6600a129ec05b7bb7453a52f845d53ac0b9eb12000000000000005a993e7d14ceea242de42ddcf6096246da2069be89330ce1bd31"], &(0x7f0000003880)=""/4096, 0x1000) syz_mount_image$cifs(&(0x7f00000000c0)='cifs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0xa, &(0x7f0000003580)=[{&(0x7f0000000140)="267bb18b43e751ceb652e712c2dd734811730e67d5ab159bff235334c44b47003bf5e9229e4746dc10db63eef56df83748cf6d80a481c75c37dce18c9758a84313df8badea104ef0f129f228e4611c7b28ed68e7cecdff631050955b12cc3b5b71fd85df0db79ceb5735983fd8789dc29cc4a44624fd039aed1125402f9072", 0x7f}, {&(0x7f00000001c0)="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", 0xff, 0xfff}, {&(0x7f00000002c0)="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", 0x1000, 0x800}, {&(0x7f00000012c0), 0x0, 0x6}, {&(0x7f0000001300)="c6d5b71cee881f570b45fd10d2b17ba6b3419ccd855b1f4ae069aa512b10b13c9eeecb4f867bc7e8df4e9c048574e1ea5ced5d8ec89a76d405394a68349752001aa7ab79b3a205f40d1849510c6156bce9c588512a46ac417dd9c0931db052fc", 0x60}, {&(0x7f0000001380)="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", 0x1000, 0x3}, {&(0x7f0000002380)="bbc5150ca417d5fa31fe9a8298ad9944a75037457817514dc37baecad917d489facac173331b2682ff6a7d9bc31960166a7ca128f6e32d3349c3d95a1fc0c2d9a88db4db318b030ad29b77c9246428f8a12f88db8ebcef20eadb5654da4e8e9f4dc39956e8", 0x65, 0x2}, {&(0x7f0000002400)="1a5efd9a92d5d9c44809de4504c9328c8a20884c80df8b7b4c34828c521b79fc4f162684bb78fe624bdd9f3b56f2bf6a80b8024967f86f332ffc8810a74f49b95e56cc645a0439be35d92c8da43b831de666efcd648c1396ba99d7472a7a9b5c4b119f009c2e5095a98ca2a304d2991d0a668eb83273ba7beb570eea7775e38ba764dc995b4dfe", 0x87, 0x60000000}, {&(0x7f00000024c0)="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", 0x1000, 0xffffffffffffffff}, {&(0x7f00000034c0)="cc73d8040cdd21dcb113ac6bcd80326bcdd1f7582c1193dbcf42a9ad01a7272c0fe6d296479c249e0bd0ca03363e5ef15c75a106510d5b92e0845f8ce4cd0ad635a33994ab60265f187d3dee496d7520a5b3b86770d1013da44f558bdc5740ac70f6634da022d04113d4f1d63b70f09804aa8bf7ed85d6ccd1636d38bca525f45c1e1a6f665e3e9a3a17b027d0c84f72bcbb01a42a99ccb1794b8e4804c315d3e21dcaf5a8781bf78e3fe098c420d043", 0xb0, 0x100}], 0x20000, &(0x7f0000003680)='grpjquota') lsetxattr$trusted_overlay_upper(&(0x7f00000012c0)='./file0\x00', &(0x7f00000036c0)='trusted.overlay.upper\x00', &(0x7f0000003700)={0x0, 0xfb, 0xd9, 0x0, 0x1, "e9aa0b74a08dfbf53e990bd6fdf89af1", "8beb9fa48ec7db3239802513a9462089cb5b3fbffbf0cba7c2f5f2325c379a341aa519cd9958f4dd123d4a7874554cc47f391e5294b25180cf25c4426bdc45cd35fc196aaf0f82ff228f161ac1781c7345378a96a414f55451f7f1608c24ceb61ebd9c935afc9d4f8c3fdc1c8051afc41a5b236be090f8e04bd4a96609012ea414aa4c274a6cea12193b6b06cef6574478e748f582a3cfe8b25d58e4153a9dabd5577025f605e9696ec4c51466f0eead9bec25346cb05619610ba319e2e9153b886b2aa3"}, 0xd9, 0x1) 06:17:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x27, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x68}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3421.439608] IPVS: ftp: loaded support on port[0] = 21 [ 3421.445379] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "gota" [ 3421.447989] IPVS: ftp: loaded support on port[0] = 21 [ 3421.481709] Enabling of bearer rejected, already enabled 06:17:48 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x4002, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000100)={0x7, 0x4d, 0x1}, 0x7) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x69}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3421.745371] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3421.812196] IPVS: ftp: loaded support on port[0] = 21 06:17:48 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="67728c8f71756f74613d00c4c1ebeba9ead6d5e6096522e7661d5f4902f637abea91b96a2c1233eeef75373b6d0d8ba76105fbf8dd608c86da1f96b1c1650d1585ef899a7f06daa74d8c98b0c1abfbe9439c"]) 06:17:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x6c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3421.962394] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3421.987498] Invalid UDP bearer configuration [ 3421.987532] Enabling of bearer rejected, failed to enable media [ 3422.022806] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "grquota=" [ 3422.078156] IPVS: ftp: loaded support on port[0] = 21 06:17:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x71}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3422.124864] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "grquota=" 06:17:50 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xa}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000000c0)={0x3ff, 0x1, 0x75}, 0xc) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x86) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000140)) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@barrier_none='barrier=none', 0x3d}]}) 06:17:50 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xe80c) 06:17:50 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, r3}}], 0x30}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r3, 0x47ee, 0x401}, &(0x7f0000000140)=0xc) 06:17:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x73}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:50 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x4e, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x74}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3423.644902] IPVS: ftp: loaded support on port[0] = 21 [ 3423.690690] Disabling bearer [ 3423.695085] Left network mode [ 3423.715417] IPVS: ftp: loaded support on port[0] = 21 [ 3423.731391] REISERFS warning (device loop5): super-6506 reiserfs_getopt: bad value "none=" for option "barrier" [ 3423.731391] 06:17:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x4, 0x4100) ioctl$SNDCTL_DSP_GETOSPACE(r6, 0x8010500c, &(0x7f0000000100)) splice(r3, 0x0, r5, 0x0, 0x8004, 0x0) setns(r3, 0x8000000) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r7, 0xc0405519, &(0x7f0000000040)={0x0, 0x3, 0x100e, 0x7, 'syz0\x00', 0x7}) [ 3423.785900] Enabling of bearer rejected, already enabled 06:17:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x79}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x7a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3423.962633] IPVS: ftp: loaded support on port[0] = 21 06:17:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:51 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xb}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3424.091977] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3424.104996] Invalid UDP bearer configuration [ 3424.105028] Enabling of bearer rejected, failed to enable media [ 3424.141760] IPVS: ftp: loaded support on port[0] = 21 [ 3424.153120] IPVS: ftp: loaded support on port[0] = 21 06:17:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3424.228598] Enabling of bearer rejected, already enabled [ 3424.271285] Enabling of bearer rejected, already enabled [ 3424.379818] IPVS: ftp: loaded support on port[0] = 21 06:17:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xd6c4, 0x0, 0x0, 0x800000, &(0x7f00000000c0)={[{@grpjquota='grpjquota', 0x3d}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r1}}, {@context={'context', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r3}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}]}) 06:17:51 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf002) 06:17:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x3}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:51 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)={0x1}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x49) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000200)={0x80000001, 0x1, 0xcf1, 0x4fe, 0x8}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(r5, 0x0, r7, 0x0, 0x8004, 0x0) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x5) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16=r4]) [ 3424.649381] new mount options do not match the existing superblock, will be ignored [ 3424.744617] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3425.423826] new mount options do not match the existing superblock, will be ignored 06:17:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x59, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x4}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:53 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xe}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:53 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@grpjquota='grpjquota', 0x3d}, {@errors_continue='errors=continue'}, {@balloc_notest4='block-allocator=notest4'}, {@grpjquota='grpjquota'}, {@errors_ro_remount='errors=ro-remount'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r3, 0xc008551c, &(0x7f0000000440)={0xe8c1, 0x8, [0x2, 0x7ff]}) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) pread64(r5, &(0x7f0000000340)=""/197, 0xc5, 0x83) setuid(r1) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="2f6e7d9aecbebcbf9e4ee2d92d4adde873aca9c1947eba70c117daecb9835d10983b4b6fda71516966b366d123665323d6274dd51c9b6549ba3f47c2bd30aa5d", 0x40, 0x3}], 0x10c4000, &(0x7f00000001c0)=ANY=[@ANYBLOB='inode32,attr2,ikeep,inode64,prjquota,noquota,context=sysadm_u,dont_hash,fsmagic=0x000000000000ffff,fowner<', @ANYRESDEC=r1, @ANYBLOB="080000206e658ec3", @ANYRESDEC=r7, @ANYBLOB=',smackfsroot=grpjquota,\x00']) 06:17:53 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf003) 06:17:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@grpjquota='grpjquota', 0x3d}], [{@euid_lt={'euid<', r1}}, {@pcr={'pcr', 0x3d, 0x7}}, {@obj_type={'obj_type', 0x3d, 'reiserfs\x00'}}]}) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f00000000c0)=0xffff) 06:17:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:53 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000100)={{}, 0x0, 0x15ce, 0x7}) [ 3426.255761] IPVS: ftp: loaded support on port[0] = 21 [ 3426.258003] IPVS: ftp: loaded support on port[0] = 21 [ 3426.281720] Enabling of bearer rejected, already enabled 06:17:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3426.440399] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3426.571115] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3426.589380] IPVS: ftp: loaded support on port[0] = 21 06:17:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x7}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:53 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "61f566f96fa22b3c5a675916108adc7a"}, 0x11, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, r4}}], 0x30}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x3f, 0x9, 0x4, 0x3c1, 0x3, 0x8, 0x9, 0x6, r4}, &(0x7f0000000180)=0x20) 06:17:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0xa}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3426.852782] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 3426.950662] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3426.976373] Invalid UDP bearer configuration [ 3426.976406] Enabling of bearer rejected, failed to enable media [ 3427.014421] IPVS: ftp: loaded support on port[0] = 21 [ 3427.066126] Enabling of bearer rejected, already enabled 06:17:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x60, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:54 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xf}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0xf}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:54 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@balloc_border='block-allocator=border', 0x3d}], [{@seclabel='seclabel'}]}) 06:17:54 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf004) 06:17:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x10}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3427.233729] IPVS: ftp: loaded support on port[0] = 21 [ 3427.240019] IPVS: ftp: loaded support on port[0] = 21 [ 3427.261681] Enabling of bearer rejected, already enabled 06:17:54 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='grpbel,\x00'/20]) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x102000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom$netrom(r0, &(0x7f00000003c0)=""/150, 0x96, 0x10100, 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r3 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r2, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r3}]}, 0x3c}}, 0x0) statx(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x20, &(0x7f00000002c0)) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x9002602}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x40}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xfff}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r4, 0x0, r6, 0x0, 0x8004, 0x0) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000480)=""/95) 06:17:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x2a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3427.543814] IPVS: ftp: loaded support on port[0] = 21 06:17:54 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e20, 0x1ff, @empty, 0x34}}}, 0x90) waitid(0x2, r0, &(0x7f0000000100), 0x2, &(0x7f0000000180)) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}]}) 06:17:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3427.676851] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3427.687071] Invalid UDP bearer configuration [ 3427.691188] Enabling of bearer rejected, failed to enable media [ 3427.748082] IPVS: ftp: loaded support on port[0] = 21 [ 3427.801324] Enabling of bearer rejected, already enabled 06:17:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x48}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3427.880845] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 06:17:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x3, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:55 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x10}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:55 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf005) 06:17:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x61}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3428.119009] IPVS: ftp: loaded support on port[0] = 21 [ 3428.119895] IPVS: ftp: loaded support on port[0] = 21 [ 3428.158617] Enabling of bearer rejected, already enabled 06:17:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x63}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:55 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="626172726965723d6e6f6e653d7365636c6162656c2c008d1e3817292ad588f41908aad4967dde5aaa35349b72889b9faf8572878f092b387978d7e55a952f122665ed1354cb"]) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffff, 0x700) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x282200, 0x2) 06:17:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x68}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3428.410625] IPVS: ftp: loaded support on port[0] = 21 06:17:55 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@errors_continue='errors=continue', 0x3d}], [{@fsmagic={'fsmagic', 0x3d, 0x4}}]}) [ 3428.493340] Invalid UDP bearer configuration [ 3428.493370] Enabling of bearer rejected, failed to enable media [ 3428.530350] IPVS: ftp: loaded support on port[0] = 21 06:17:55 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000480)="00edc3bd6df1a54c333dcbd63391e75981f20e0cfb09a38a0f0dfb53", 0x1c, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={'cbcmac(serpent)\x00'}}) r2 = open(&(0x7f0000000180)='./file0/file0\x00', 0x48083, 0x80) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000000c0)='ceph\x00', 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:17:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x69}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:55 executing program 5: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3428.836620] IPVS: ftp: loaded support on port[0] = 21 [ 3428.863596] Started in network mode [ 3428.870901] Own node identity 60000000000000000000ffffac1e0006, cluster identity 4711 [ 3428.889108] Enabled bearer , priority 10 [ 3428.955269] Enabling of bearer rejected, already enabled 06:17:56 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x5, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3429.219502] IPVS: ftp: loaded support on port[0] = 21 [ 3429.494360] Invalid UDP bearer configuration [ 3429.494389] Enabling of bearer rejected, failed to enable media [ 3429.521805] IPVS: ftp: loaded support on port[0] = 21 [ 3430.006265] 32-bit node address hash set to f9ff1ecc 06:17:57 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x60}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:57 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x1c0, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000180)="b276705c7159f930b28b556e9d15e65cce2175514edae75e93e04590638987ba8c7bdca24819158f3cead32335cacc5fef7e17f4c79a9fa0ff0bcd5e88c7ac815eb6dffcc5b262ee8aee53472a77fba2dd35e32ea808ee8bb3cb05a9a996bf2ed9a5e8695ad42cdcc0cde758e8416234f1f1b17a02751841992abe2e9b40e26dda5ea0d826156dc0e4b7c3b02945fffd4f8691f6cfbba54a9084ef739bdd3c4dbd0008c208ffe3133d9536b412d701f8360a0d9b45c4c9cf36b010517fb7fbd968783301ca761e76693bc4b726d36dfe5c141968d272ec263f10f86b805da3", 0xdf, 0x6}, {&(0x7f0000000300)="8573ed10f396168977a707f063f01e6f277556a265f96ba1b53e7e297b43514e60f2f512eceae2db180e439335431d5557daf4c44d5dc1f4a27c982f9450721ec17dc110b1ece69d3e5b29a8f867811f78dcc0ffbd23059fafc4368b4ec44bf77b549197c557e076898f0d722b3c3e3511b5214caed0c38ab5f970a3a3d57e0119886f4bf8bbd3a8c7a4be3cdcf218e06155dfd726d94f3002eebf880a75c1d05a74a6f35399d203e4d53f23f1d96a6e60d554fc0c", 0xb5, 0x7}, {&(0x7f00000003c0)="f3198e45c638e7ecb674e9e9d5182d4de37cb2e20a3f6fdd516d9e613e2688e94ad6a75074e80ba826d31179f65a143c194ce1126b22782e41af835f194f67b7f28b439764dd072c9f2115061a13b52e4b84eed415235a381ca0bec50e6b4aa9fa9aab005060c093d30b53de9d34a953af8415075ed495ed99cf4708ebae48d6e4437c2d4b6419782f7ece8c668fe6e42c5ffd54485c6f8eafd06d2989ced800fdcf92d62ab5283574893a9c65d8ad0980c6a83f258b7cd730c9d4d9563c057ecf9d953765c34076bb4be6aae7831be6f4f2af6560ad68b5db5b445b62531f9adf240c2e6f9d40b3fb5ba41b8ff16dd67cd21061715a807451db607e85438b1f20b68ccd5cebc3a7433726631e79e6f2cc9c227dd17903ed955f0aa918afbe15b63d50debfcb0d573539af01952f183a644c4cbf920d13cad7c214f4e6d1b8b5153f614fd34fda3cde6bf4825c69d5f9adc146e9e2f461f6a03bff5254d713bef15484d1e852b890ed2e77c0be447557443f5f75cf8711d0e452c34fb805acdd547afb337dc8105aa5bfa2b50747c2623fb6b568538b7412e4b0dc71b901d8301f111583c7366d6325c65ae4d090bf3bf01c3eba4c80578d2fe02bf0dbe402294cd11508321a9d68c212a5ede899cf3bc2ecf2ed115a888ed37c4089267fb3af36661170e321bd19a1c2f983b68cfc18016144850b2f9dfed700fb54dfc67dbb9bc7c98cb602f145cb3252ea0e92b6b75b5eeb9e827d37727807c1dc5d8f1d8ac84b9e3b0540c5fba86908d14ed6ec9b08cf1db2339fa23331846ab1f054b723af261da63439006663a9c6f9c926f4a98e7faec125284be7eb45e790336b07c8123b070d21cae0176a8924d46a8224f63aa3378e11572f0afe8c90b6e7462ec02eeb90d35ddb3038a4f6ccb9a9cc42c529368c6655f6f6510a281ebc046efeb4ed834e1a455ab71433fab6f6846e3024b50de62aa7216e8a03e48c68501b3ab9d59c1c8f1b0c132b9982bec8248537b1ae61d874ddc80836380a1a909b3070b37e3e1a3d522bd3b80da208a7190d64df0e34bb59cd52b06dea0eeb82528e8cf9e794376e3a34651287119c612d8dcffd824306ef1732da210ea00ca82613118554f1965161c2f4f2bd5fb1a8607875117c77b0ffe86df5a157edc46b256e70ccc015fd8d4f74529d8fd5a0f9a35d2b34f5bf888e00b4ad5242c4284b3c554515601b4d0bace8cf8f1e12a9060a1a5ed46534b9d88725b7767775333c842898db348a81f75a1faf6544ad8e25e50081930c7bab22e071a608fab9ebb28a628157058b8660b62f32d4bdfeaa7b26da67ac76346c310fa7515850334c0bcd982c217939dfce7c5fb25cb97aa44aadc5737ff93511ec172cdcf87d5cd277ced0628c2ba995563ced22adf6dabf21d75e93af6a34a66ec9c63db768e913c2a8f13d83f124b8838f3ab5d53344f3bc1311ca7d16264e84ef92c294f2b20177462fb61ccf974c3909b49a9c34b48df442f64fd37247dea7abea50c76ffee8d8281328ab788ee89420a687976451717af72186722d049b09bded72299e8b2a80bf2019c7fcbf4b3e91f2f9788594af36def20ca1744bb9cf88e45a4896e0ef069527a4261f0370be184c2160df8047811370c4a0ab513cb596fd53e0eaae5f7e7a9d2330b92921df5be1d709b1c0b2b5d97f0c10d7b44dab8802161e1aa48fdee62ea27ae87d428efbf0bebbe17507b78df28f67c4b0c8f126ac6ab0e849308c91db85a26b89086fc8486481ef49167c4310958cc3b810ea4c323f2cd51597c490d6138132b94fecc881db71b21fdf9830d916f391d74e5fa5fec4b8b9bfad43d84dcba01932b6699003bd5b17b17a25fc7ee0647da80c290112ebd2a74e442925b2aacd118c8530d27ea25d6978a501e58cf337e033e7b6e6d11472a64fd3c409841b6e066573d53d2200f93b3aed570d8f1e9b0a02ae63706b130818913dd54aef7861920a9c1b927dd718a747884f7f0b39219ed002582c0eee784da4eb6cef833c84b6a8df8c29e89be2b68aa803dba6d219f041b82294083319ceda0cef0a1f946c2b24bffa9458913530c3ab9af9440208aea156cab3b266363015b28ce025cdc3f146a72210d511ae5e776f168c126e921d16abe8e06e505f3adafca1dec5689b184a18c61a7e06fc2b8090be9ef8838ab69fea5e9319d92ca4fe2aad305dfa8f2c70a6cbbf575b7d335e0a5a094bccc5d52b1ecd966cfb3bb8e92849f55f0b0c0d13fe481623c0e1ad66701c87b8621502b8fa4ef710360b477d3a4ef32310e45b98b677f19ca747b7990ce7d6d301319455e96268ffb6f3ac3cb23386c3abed33563bb8180b0848bda6857fcc99c2eaa871b24805e24446178f1fb163a7b6b1af876423ffb3a552c9bf1fe38e75f66a8851b19c7a9b12396ee00b6823f46eced83c7f49148d81b8ae7d10eae216c009b7e5f348deefa0281520ca41c19e6b220b1e5f6e16d41246b67796c5fca4c678152efb3d1f63b6fb5dbdf5eab4b04328bc3ff607c9b778021fed8fd620ead63f4f65f5a1c9319c21a1bb5f76ec41726b07f82de54e52d5bba1acb6b79fbfc4bf40f461cc77290843c764eb9b368fed384fdd9ae715faeeeb85cf656c598beccec41efd4a7a555095f6452a00f39b3a94ce51a5c3cfd381e92a26156a270916a1bca9f75c76b655610764dce435a2741b644abf7965265bcda42762aeb1672829953f7f3dca03deaf9601cfab327667d4772da185c7a840aebebc91053d56de96e5973e4bf413264ba29d832867aae3fcd0fb27efbf7a954d735b3818f8429078d1869ff0b52896994aec535bda5a785313540085c5b60747709e70494cfabf09f20e778b7d054d60eaa1e4854939287c21f4ba2526bb456d8505c1d19187c9336a74618a0ffdd146dc2cdd9af5b55702640f6089f95b67cde54c5558bbef49210c5ec2e098b58906d0533896dc6d83b605e71771a288d767ba367b77aea4210a4efbc67b55665a28c581704432c1270518dde518c881527c168603c9f87625f034b9b039dda8ff26e854d346c8229942116274b6b4d13488bf11bee63002674947831856e6616113b7cc70580ebc73363c938896618ae58b16061e5763948b6a8d717c9995fdb3882cf80a84284e3a392f9c0f2fe79c5bdde5af8459fc69db7852ba5e8fee756d428a268fbedca32fc4cf0d3eb7fbbe705340cf6c1ff49d4520c4c59c06680afc1fd7904fd3f103ab6f915731763f2357171f0a8572fa3fa4b1cdd39134c138f4b44e906de5c5ff55a16feabe761891b680c4ed17bfb1b6be0ee757573f799a837cedaf8d16f62611553f6ccdd9b5aafc3f7d6619343aa2e698e4012537d559833525b0213027f1cddd4944029033cd687a165558902f0801776a0e7eae4a65a3f33776fdef0a6be12de9619ffe8cb263a0d29e0b73068de1d937732febe0bc15fbedabadf4751d3ab626e26a2e50d54ce6e21c39cae4fb8b38543add03ecb120dcd1410712f29e295abb32354b6c17e7deae4163318e3eeff6e326f885e63cfd6241c293b9fc708540c21234c4b549431169edd5402505cdc4044f4a09bbd96d07550f7a9e965c71bc4e664a63afa9b8bbdb69958c2acf999107cfa2268a656ffab5a332ec1cde3c74adf5c250af5786680f86a96627567826270fda739eae2b006c1748f11a2909d162e7dd1cf581e2f31a5ef9d911b6300463b7f84adf020be7e161eb626e631e088d9f264cf21bc7093ae681b2b7f0253752abce128e041445a6f3f04d46860a6586cb987809b13288408cceb8de538cee8bac4237b415b833f40b35e8e08943e7c14ee5d274b824d03268225b99962888b1ed5dc094abfe126853606b8c0c00a4153953a6853e2e3762d50a0088178e5d136b6c12f46b3dcf3282882c542781015957ddac571ac5bd7300a8c4bc63b9ccc4da681b25175dfadeda45e3fd993b0a588ce5ab93a065840e7467de3221c6ff2ecaffe0616331e4b3e5edbddb6509c92d16fe8ac3e54254a939fd2f55f8568e2e0b84b1c61c99108e9e448609561a473466c7d6310f026bd0d8373d8f5f4ace97ffee4626f2a0b9836931eadcbd25c15c952e376d371a2af166d4e6a11214ecdb1ed4e785e6cf159aa8cb47b10c9294211021e6a34484d833bdb3a1040494f1bddd0a11128d2e2038cea3c5dff0a8cc5a5886f7e2b155369a0d40708ac62228e9e686ba2bf8ed498053984a4d677472cdb47d908efd251468c0e390738d836bb294e89d0b283265ad60c5156b6a4478bfb26af8c5580c106d3ef58fb93500b9748843bd696c16b26821f51de1f61ae0ae2f08b9f072fd401718a42adf89d19045358fd25db47c37c51586597c5c7b823163166cf74841e02617177cfcca5cecef259ce4c7c04784163df3f9a0db3919a062cf3afb092e03fd63df6a8bd71b1e967e6f82b09f16577b4b77cd99011c9835e1639ef0dfad7b2319f65bba764e2d90febcb89ddd31cfce2453f0c5dd87c1e19e6f833e0b4ede9c440ef29d2a33baa4fc84c095ce44f1f07bafcdcb0ed6f7d99bfaff92f481487e31a8b47c0ff40c8352a365faed983798856faed3a9ceafc70f3378d5f301282f01064f3b729ec71d9bc60c95a243cb08580e29167ef309364a0cf14e3eb073f27b19a368f758cf2501ea1f0e7e8c011ba227d619fd1dc1085a5ab8758d3c491b8b7d8fb4097eccce0cef9d64ee84669378833136df2de7ca98dc14118bebdf0cd0160f710bb98fee9e750ad835187463af436ba37ecbb544cdd1f4ff8c7dbb84bf01af5d59a7fdf4087ef55158040dde4347dd03c7e274ab7c2a0323162325cce229aaee60004a6335c2c50122c4616111d6d1c0c3407b448f897f9ee031da09cb53a9e81b6bb5cd665035a0d81cdd7de1ca1849b87167206bd2b6cf973a14ca27b83f2d15dd6df7c8e220f133ae04b2b01c8472a1d050a2b28a109c15188a9e6c6c11c1e896aacd9cf7b85ea4099cd0fb49b85ccd07c0d83e826a501a7b7689bbfa132eaa6fb1e7405c1f7f7d5ee8419641f89411c4b328abf9ccd063b4260f5b12b29c3b2606a88e1486b063d7bc9db3d5caf6287b4b814c9c7e9b8903ec277708f7bfba4adf7bb236e73c43f19840d1e58179b584794159963b62e54685b3593efda1a437403e888b3b60153fe6dd79dce2a6773a562cfdc16e674f991b25836e2666d55728a93b4e87b7a04de83a533ca6066ae232ae79a1b90e4203ea78798dd39c1cb030a1e0745040e6644817fdc5f38421350c189ca14b3fcedb1a415d4c56f065d708e690ed8256e6efb55f41f4524049ae124f5a66d2ff9faed11ea90bd6fbc0cf614f5e6b27eecee4e6aef15c31ee48a978493d1f36c3ad83a5e0dfede7e28f88abbc5cfe1839950b6cf13989c62104a2494ce140ef1300c5dd1ae94abd07891e4806cb11f3b9699b4cac7f0ae65c6beaee16db06e979b28b06bea303103c94f099e747583120de550b4535a11e75b2c3802a88a38525edb6e41459754e79d285a97a2b78a4b9eee66228da2f57fabf663f9a984001c89d5e5a715a0890ec244409621c9b255debb52c93a8b4a50693bc21c1864f5f13a37f5ab95162adb2c0f9d0d023837aef26b7669abbe5315168d2f4fd72d573ddbea2e80718ad224d2b1f2a149792f2a343dcba5e883a4f1dd3d9828410931098790bbc9889ebe3b240941147111f67f5c30010e2f47bcc9a3b3b13f0d8de09071fa8eeb2029a454d5afe77df9972bf0fe08b0187abf8379f53f7a8", 0x1000, 0xb6}], 0x110000, &(0x7f0000001440)={[{@check_strict='check=strict'}, {@block={'block', 0x3d, 0x1000}}], [{@obj_type={'obj_type', 0x3d, 'reiserfs\x00'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r3, 0xf507, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000000c0)={0xfd, 0xe9}, 0x2) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:17:57 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffff9e}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:57 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf006) 06:17:57 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x6, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x71}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3430.807582] IPVS: ftp: loaded support on port[0] = 21 [ 3430.820281] IPVS: ftp: loaded support on port[0] = 21 [ 3430.845944] IPVS: ftp: loaded support on port[0] = 21 [ 3430.885819] Enabling of bearer rejected, already enabled 06:17:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x73}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:17:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x74}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3431.134848] IPVS: ftp: loaded support on port[0] = 21 06:17:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x79}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3431.220990] Invalid UDP bearer configuration [ 3431.221015] Enabling of bearer rejected, failed to enable media [ 3431.257680] IPVS: ftp: loaded support on port[0] = 21 06:17:58 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xf0}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3431.317617] Enabling of bearer rejected, already enabled [ 3431.325601] Started in network mode [ 3431.334347] Own node identity 00000000000000000000ffffac1e0006, cluster identity 4711 [ 3431.356975] Enabling of bearer rejected, failed to enable media [ 3431.406689] IPVS: ftp: loaded support on port[0] = 21 06:17:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3431.439209] Enabling of bearer rejected, already enabled 06:17:58 executing program 5: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:17:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x26f}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3431.578061] IPVS: ftp: loaded support on port[0] = 21 [ 3431.595597] IPVS: ftp: loaded support on port[0] = 21 06:17:58 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2002041, &(0x7f0000000200)={[], [{@uid_lt={'uid<', r0}}, {@dont_appraise='dont_appraise'}, {@smackfsroot={'smackfsroot', 0x3d, '##%/&-\'[/:\xdd*'}}]}) r1 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x1, 0x220c00) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000002c0)=0x4) chmod(&(0x7f00000000c0)='./file0\x00', 0x84) 06:17:58 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf007) 06:17:58 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='grpjquo\x00'/20]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) mount$overlay(0x0, &(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='overlay\x00', 0x40c0, &(0x7f0000000440)={[{@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}], [{@fowner_gt={'fowner>', r1}}]}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = fcntl$dupfd(r5, 0x406, r3) ioctl$EVIOCGABS0(r6, 0x80184540, &(0x7f0000000500)=""/229) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000000)=ANY=[], 0xfffffecc) sendmsg$IPVS_CMD_GET_SERVICE(r8, &(0x7f00000001c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="e4000000", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf250400000008000500000000800c000280080009000000008008000600010000003c0001800c000700200000003100000008000800041200000600010002000000080009005d000000140003000000000000000000000000000000000108000500ff3500002000018008000b007369700014000300ac1414bb00000000000000000000000050000380140002006d6163766c616e300000000000000000060007004e23000006000400810000000800030000000000050008007f000000060007004e2300000800010000000000050008001f00000049a47894e34c27f61f7999832cd9523ab0a626eb102bf28b4fab3752854a3056e8eb11782ae390d774bb4007dc9e1acd513bcf8184c0d34720b9c917e017add51558686e5a3bd88ae96715ba813f55104ad06853bcff469fae03e7"], 0xe4}, 0x1, 0x0, 0x0, 0x12}, 0x44000) ioctl$sock_TIOCINQ(r6, 0x541b, &(0x7f0000000480)) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f00000004c0)='./file1\x00', 0x8, 0xd9870e437b5095e6) [ 3431.718220] Disabling bearer 06:18:01 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x8, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:01 executing program 5: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:01 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf008) 06:18:01 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) 06:18:01 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x300}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3434.111497] IPVS: ftp: loaded support on port[0] = 21 06:18:01 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400, 0x0) [ 3434.151727] IPVS: ftp: loaded support on port[0] = 21 [ 3434.158004] IPVS: ftp: loaded support on port[0] = 21 06:18:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x500}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3434.203091] Enabling of bearer rejected, already enabled 06:18:01 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000180)) getresuid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x210000, &(0x7f00000000c0)=ANY=[@ANYBLOB='user_xatt\x00\x00\x00\x00\x00\x00\x00\x00w', @ANYRESDEC=r3, @ANYBLOB="438a17414f87549661e79347aa"]) 06:18:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x600}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:01 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3434.487425] IPVS: ftp: loaded support on port[0] = 21 06:18:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x700}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3434.595996] IPVS: ftp: loaded support on port[0] = 21 [ 3434.736831] Invalid UDP bearer configuration [ 3434.736867] Enabling of bearer rejected, failed to enable media [ 3434.783391] IPVS: ftp: loaded support on port[0] = 21 [ 3435.053179] Started in network mode [ 3435.059818] Own node identity 00000000000000000000ffffac1e0006, cluster identity 4711 [ 3435.080747] Enabling of bearer rejected, failed to enable media 06:18:02 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x9, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:02 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x500}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:02 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf009) 06:18:02 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x700}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0xf00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3435.283878] IPVS: ftp: loaded support on port[0] = 21 06:18:02 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) syz_read_part_table(0x7, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="046c281f197cc27dd808fa6fa1f1850924515cdb21a5c5fb78392074844b", 0x1e, 0xfffffffffffffff9}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x8004, 0x0) getpeername$packet(r3, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000340)={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00', 0x2}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000380)="011126632fc650fbda042565cfded9d586beda4156190cfc011e71c76200dd", 0x1f}, {&(0x7f00000003c0)="6d310a2ed69df5c9047d9dd9cbe4803e43802534c0ff8a6c4db7ca62efd462d7fee0607cda6e46b4e0e6208289554b06a5043ebd0cd5c486005ad5d070f3446e03212dc8f1aa41fd389f05191bcceb2593c0f06096dc751c23de849554ae874c2baf0c962109d2cb701ea6e6b7006aff6e76a5abdd8c5ba04d04fba27030ccd71ffa97f018b36d8a17981972d5da07467476cba6bca09a9c3d208cfb2943979e8ee4730dd961289a2aa5a2cc92c32ed9a497edadddc920243d350a5db0fd6f3a73fc91f7d45c9f6d59d99de3160255254a0b1c580103b0e203cf35f2f0e3", 0xde}, {&(0x7f00000004c0)="f106680a5681c5a455e829956509e42a577d0ea6eb6e4d69c6", 0x19}, {&(0x7f0000000500)="5c80f3b92f52b78b5f06095af7a829b7e53c3c91538c5015b7c14c855dab1a4c1d26d6a94f18e30484af484e8613519466b0faffbe5d0f4d13fc73b94d9145b416adab550c05349c6ed45b8119207dd0db6f3fd61cc9adcf49b7e9be8c0229c9b76096437fb77ef7f2c51b7c6d539609b640df92e737e738c02bf9409cf127eb5904e56f5ee1f1ec2f826c03f40388e09106bb63ffb70c58c1ba60ce4d", 0x9d}, {&(0x7f00000005c0)="d9595ca8e6079c1a6c", 0x9}, {&(0x7f0000000600)="03465885ab1ca27d7c9e71b9f351661d24", 0x11}], 0x6, &(0x7f0000000740)=[@pktinfo={{0x24, 0x29, 0x32, {@private2, r4}}}, @dstopts={{0x100, 0x29, 0x37, {0x21, 0x1c, [], [@generic={0x37, 0xe4, "26946deab55e3f8438fc25ea07e7c0ef05614f799fad2b257f73c1ead8eaadac18871f69b018d3b0370e6462f8500f4e179dd59dfce251e0e13d95be35ad20d7d06b486f32dcc9b67b79f093ecb6dc5e6ba06b59a281e8227674cc4e5f54abf58b93bd42a56cf1e21a946fbe374869dece48c2a820d8880e6e17031af34e245a79f010836c8921c445014db68cec79f243c8066d9669832b8c2812c89286d81e63e7cf9fb371ddfeed6e12f80ee43b21fd74852872bb5eb34a5a5cb8e7dc8ca5275f4f9230c043084fdae4c8e59918fa7465eb13b6024d8039ed871ad760323c053bfe68"}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x5e, 0x6, 0x0, 0x7, 0x0, [@private2, @empty, @empty]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x8, 0xc, 0x0, 0xe1, 0x0, [@private2={0xfc, 0x2, [], 0x1}, @private1, @ipv4={[], [], @multicast1}, @private0={0xfc, 0x0, [], 0x1}, @ipv4={[], [], @private=0xa010101}, @local]}}}], 0x200}, 0x4000080) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(r5, 0x0, r7, 0x0, 0x8004, 0x0) r8 = accept4$alg(r7, 0x0, 0x0, 0x800) fsetxattr$security_selinux(r8, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:scsi_generic_device_t:s0\x00', 0x2b, 0x1) getpeername$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) [ 3435.307264] IPVS: ftp: loaded support on port[0] = 21 [ 3435.326398] Enabling of bearer rejected, already enabled [ 3435.394483] IPVS: ftp: loaded support on port[0] = 21 06:18:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x1018}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3435.534817] audit: type=1400 audit(1594880282.468:6453): avc: denied { relabelto } for pid=25245 comm="syz-executor.3" name="ALG" dev="sockfs" ino=845945 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=socket permissive=1 06:18:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x1800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3435.662411] IPVS: ftp: loaded support on port[0] = 21 06:18:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x1810}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3435.855974] Invalid UDP bearer configuration [ 3435.856004] Enabling of bearer rejected, failed to enable media [ 3435.914507] IPVS: ftp: loaded support on port[0] = 21 06:18:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3435.964072] Started in network mode [ 3435.974850] Own node identity 00000000000000000000ffffac1e0006, cluster identity 4711 [ 3436.004959] Enabling of bearer rejected, failed to enable media 06:18:03 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf00a) 06:18:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0xa, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3436.450288] IPVS: ftp: loaded support on port[0] = 21 [ 3436.702047] Invalid UDP bearer configuration [ 3436.702076] Enabling of bearer rejected, failed to enable media [ 3436.732786] IPVS: ftp: loaded support on port[0] = 21 [ 3437.073597] Enabling of bearer rejected, already enabled 06:18:05 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x600}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x2a00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:05 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xe4c6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@smackfsfloor={'smackfsfloor', 0x3d, '+\xb7(!((\'\xc5'}}]}) 06:18:05 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf00b) 06:18:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0xe, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3438.279132] FAULT_INJECTION: forcing a failure. [ 3438.279132] name failslab, interval 1, probability 0, space 0, times 0 [ 3438.310283] IPVS: ftp: loaded support on port[0] = 21 [ 3438.317831] IPVS: ftp: loaded support on port[0] = 21 [ 3438.323750] CPU: 0 PID: 25444 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3438.331662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3438.341031] Call Trace: [ 3438.343640] dump_stack+0x1fc/0x2fe [ 3438.347286] should_fail.cold+0xa/0x14 [ 3438.351222] ? setup_fault_attr+0x200/0x200 [ 3438.355579] ? lock_acquire+0x170/0x3c0 [ 3438.359573] __should_failslab+0x115/0x180 [ 3438.363818] should_failslab+0x5/0xf [ 3438.367542] __kmalloc+0x2ab/0x3c0 [ 3438.371121] ? __se_sys_memfd_create+0xf8/0x440 [ 3438.375806] __se_sys_memfd_create+0xf8/0x440 [ 3438.380317] ? memfd_file_seals_ptr+0x150/0x150 [ 3438.385095] ? posix_timer_fn+0x3d0/0x3d0 [ 3438.389263] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3438.394036] ? trace_hardirqs_off_caller+0x69/0x210 [ 3438.394980] Enabling of bearer rejected, already enabled [ 3438.399097] ? do_syscall_64+0x21/0x620 [ 3438.399116] do_syscall_64+0xf9/0x620 [ 3438.399135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3438.399147] RIP: 0033:0x45cba9 [ 3438.399166] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3438.440944] RSP: 002b:00007fe63f54ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3438.448757] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 000000000045cba9 [ 3438.456040] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 3438.463320] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 3438.470598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 06:18:05 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x200002, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) splice(r1, 0x0, r3, 0x0, 0x8004, 0x0) write$cgroup_devices(r1, &(0x7f0000000580)={'b', ' *:* ', 'rm\x00'}, 0x9) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000540)={0x2, 0x0, 0x1c, 0x6, 0xc5, &(0x7f0000000140)="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"}) [ 3438.477880] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 06:18:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x3c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:05 executing program 5 (fault-call:4 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3438.513292] Enabling of bearer rejected, already enabled 06:18:05 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6706706a5f68c737613d7365616c6162656d2cb8c31cd58900"]) [ 3438.657877] FAULT_INJECTION: forcing a failure. [ 3438.657877] name failslab, interval 1, probability 0, space 0, times 0 [ 3438.696152] CPU: 0 PID: 25488 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3438.704078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3438.713442] Call Trace: [ 3438.716045] dump_stack+0x1fc/0x2fe [ 3438.719695] should_fail.cold+0xa/0x14 [ 3438.723597] ? setup_fault_attr+0x200/0x200 [ 3438.727934] ? lock_acquire+0x170/0x3c0 [ 3438.731932] __should_failslab+0x115/0x180 [ 3438.736179] should_failslab+0x5/0xf [ 3438.739908] kmem_cache_alloc+0x277/0x370 [ 3438.744094] ? shmem_destroy_callback+0xb0/0xb0 [ 3438.748781] shmem_alloc_inode+0x18/0x40 [ 3438.752861] ? shmem_destroy_callback+0xb0/0xb0 [ 3438.757558] alloc_inode+0x5d/0x180 [ 3438.761197] new_inode+0x1d/0xf0 [ 3438.764587] shmem_get_inode+0x96/0x8d0 [ 3438.768580] __shmem_file_setup.part.0+0x7a/0x2b0 [ 3438.773443] shmem_file_setup+0x61/0x90 [ 3438.777435] __se_sys_memfd_create+0x26b/0x440 [ 3438.782032] ? memfd_file_seals_ptr+0x150/0x150 [ 3438.786712] ? posix_timer_fn+0x3d0/0x3d0 [ 3438.790874] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3438.795642] ? trace_hardirqs_off_caller+0x69/0x210 [ 3438.800672] ? do_syscall_64+0x21/0x620 [ 3438.804663] do_syscall_64+0xf9/0x620 06:18:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3438.808489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3438.813691] RIP: 0033:0x45cba9 [ 3438.816889] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3438.835801] RSP: 002b:00007fe63f54ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3438.843533] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 000000000045cba9 [ 3438.846589] IPVS: ftp: loaded support on port[0] = 21 [ 3438.850806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 3438.850815] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 3438.850822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 3438.850831] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 06:18:05 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\t\x00\x00\x00\x00\x00\x00\x00label,\x00']) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000700)={0x2, 0x9, 0x700, 0x0, 0x17, "80000000fb00"}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, &(0x7f0000000b40)={0xfff, [[0x9b, 0x2, 0xc78, 0x0, 0x0, 0x4, 0x400, 0x4], [0x7, 0x1e84, 0x0, 0x5a27, 0x7f, 0x619, 0x7, 0x10000], [0x20, 0xfff, 0x200, 0x4, 0xeb, 0x7, 0x0, 0x40]], [], [{0x3, 0x80000001, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x4, 0x0, 0x1, 0x1}, {0xffffffff, 0x6, 0x1, 0x1}, {0xfffffffe, 0x588, 0x0, 0x1, 0x1}, {0x2, 0x80000001, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x5, 0x0, 0x1}, {0x3f, 0xffff, 0x1, 0x1}, {0x4c7, 0x9, 0x1, 0x0, 0x1, 0x1}, {0x5, 0x1000, 0x0, 0x0, 0x0, 0x1}, {0x20000000, 0x4, 0x1, 0x1, 0x1, 0x1}, {0x5, 0x8, 0x0, 0x0, 0x1, 0x1}, {0x9, 0x3ff, 0x0, 0x1}], [], 0x7c7}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x10], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000000c0)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000a40)={{{@in=@private, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x40, 0x7, &(0x7f0000000480)=[{&(0x7f0000000140)="83eef6d679fdcf8f11722ddc65545acc091f6c9e35c5017a1e79cba164866be631cfe8085913a70b890ec26daa3656b398319b546d82122740d05ad61155", 0x3e, 0x6}, {&(0x7f0000000180)="ce3900f275a36694b254bd0acf8969b639c6d95f1ef100a932ceb214648b21cee9799802de23f679df68b3460f1d51c80923f3e9fd22a15787ecc0d079dbd79fd592aa28d17c3ed549129530df803c2836e423573963d314bfdb26e3202ea12000914c8103b2cbbaef54ae6567", 0x6d}, {&(0x7f0000000200)="92135b16683df954f5f623c3ed28b51c286f2a1a18a86a9bf3fa952e5edae7e23400f4bee8376305d343816e8224a09e404fa1afea4c26da41d76fa6613a3dd2a352a8085b8b7f28c07827c1cc43ad42086a4c55f3cb0d486c2555c90b737a6e24b5e6ed3ba83ca0313c94d849a7c87e890eb26a602ea86565e134d35be64e72c89a818470ab693fd230eb662909eb0617cfdb517ae04a8d5394f0fb47ef000c19e788d327f187cad5813e37d589948a23ddce990fba9b18701105c951524d11e6d6d06b911c727f47f465b1f564c12902f38b962de408d9", 0xd8, 0x1}, {&(0x7f0000000300)="a88d76161c07ea7e9cfc65fc8ed7b563f55ca54495c8bd8ff9d0f09a5db2d3ab89eb957e8d1337d174507c8dc7d8715f59b532f3a1fc", 0x36, 0xfffffffffffffffb}, {&(0x7f0000000340)="72812089b4f9615b5a12b83bcdc4ee982d07ca995558ba66a36726507246d25100c6e6624f5d74d591456427a19859eafe73f682110827d9f9b38b5ee6008230ae699839a838f380ae8a2a08f76e2a1addabe3aa3bface8fb3cb3aaa5dd1dc5cd6d352498a8081b5ca612981b7bda6c48996cf2a", 0x74, 0x3}, {&(0x7f0000000780)="dc51e0cace86149e14286646b96439832a0eeecad7007239f54cdd2df3faa63673b6033950a80d56c4425405f5eb6a01786a18705cdc5bd4538107c244b5a31b9b62e7c41da49283d804e033a5c42247e6322aacc139ab4bf30bc871c5f54d25661c3555b01482e75d4f77647ad1f484f1", 0x71, 0x8001}, {&(0x7f0000000440)="5df5c67ee192a24597ebcc5a5c7b", 0xe, 0x2}], 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="73686f72746e616d653d6c6f7765722c6e66733d6e6f7374616c655f726f2c73686f72746e616d653d77696e39352c696f636861727365fbff6d61636963656c616e642c696f636861727365743d63703836322c757466383d302c6e6e6f6e756d7461696c3d312c7569643ecb6879cc0fc7ac96596c07fc9886a9990c437db2ed6970c0f0a50b9eb66ddb5e7101f8db93527d5c5551fae08be3d4769bd18d11d5aaf8faee3221368ddd78bd239dfd76d26e990e31b533d19e076c7bc171455c699301a035864099187667f37208b313e5eda96181ee4ec15a1ffd19", @ANYRESDEC, @ANYBLOB="264a6bcc1e", @ANYRESDEC=r4, @ANYBLOB="2c736d61636b66736465663d7265697365726673002c736d61636b66736065663d9d2c6f6278743d757365725f752c657569643c", @ANYRESDEC=r6, @ANYBLOB=',\x00']) [ 3438.909069] Enabling of bearer rejected, already enabled [ 3438.947080] IPVS: ftp: loaded support on port[0] = 21 [ 3440.136295] Left network mode [ 3440.246289] Left network mode 06:18:08 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x700}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:08 executing program 5 (fault-call:4 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:08 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf00c) 06:18:08 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x80, &(0x7f00000000c0)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x44, r1, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x9, 0x1, ',&:+\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8880}, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r1, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x4800}, 0x20044004) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000240)={0x7, 0x8, 0x8000, 0x7, 0x0, "1e1fa36f0f1f2f97"}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) 06:18:08 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x10, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3441.346319] Left network mode [ 3441.430269] IPVS: ftp: loaded support on port[0] = 21 [ 3441.444533] FAULT_INJECTION: forcing a failure. [ 3441.444533] name failslab, interval 1, probability 0, space 0, times 0 [ 3441.470343] IPVS: ftp: loaded support on port[0] = 21 [ 3441.483695] CPU: 0 PID: 25560 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3441.491624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3441.500988] Call Trace: [ 3441.503590] dump_stack+0x1fc/0x2fe [ 3441.507238] should_fail.cold+0xa/0x14 [ 3441.511145] ? setup_fault_attr+0x200/0x200 [ 3441.515487] ? get_pid_task+0xf4/0x190 [ 3441.515555] Enabling of bearer rejected, already enabled [ 3441.519393] __should_failslab+0x115/0x180 [ 3441.519411] should_failslab+0x5/0xf [ 3441.519426] kmem_cache_alloc+0x277/0x370 [ 3441.519445] selinux_inode_alloc_security+0xb1/0x2a0 [ 3441.519461] security_inode_alloc+0x67/0xc0 [ 3441.519478] inode_init_always+0x5a3/0xb70 [ 3441.519492] alloc_inode+0x7a/0x180 [ 3441.519504] new_inode+0x1d/0xf0 [ 3441.519520] shmem_get_inode+0x96/0x8d0 [ 3441.519539] __shmem_file_setup.part.0+0x7a/0x2b0 [ 3441.519557] shmem_file_setup+0x61/0x90 [ 3441.519573] __se_sys_memfd_create+0x26b/0x440 [ 3441.519588] ? memfd_file_seals_ptr+0x150/0x150 [ 3441.519608] ? posix_timer_fn+0x3d0/0x3d0 [ 3441.584794] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3441.589650] ? trace_hardirqs_off_caller+0x69/0x210 [ 3441.594678] ? do_syscall_64+0x21/0x620 [ 3441.598664] do_syscall_64+0xf9/0x620 [ 3441.602474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3441.607666] RIP: 0033:0x45cba9 [ 3441.610861] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:18:08 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)=ANY=[@ANYBLOB="626172726965723d666c7573683d736563e72d2dc556968fbf1fafc583685b6c6162656c2c00b179b705089ef4544eabe17bbc6449bd6544e46ac803cf7516bd2328cdf09d68ed042b4f2dbb3f46092cabcc52e6a9777813ae6c16e1413992f47e62e857b8751564d94554c67dcb0d6f14f7843db15158837b0acd79aafcc054034138cc8ee84c605defcdd82c"]) 06:18:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3441.630902] RSP: 002b:00007fe63f54ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3441.638631] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 000000000045cba9 [ 3441.645905] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 3441.653175] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 3441.660448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 3441.667731] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 06:18:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000380)={&(0x7f0000000200)=""/27, 0x1b}}, 0x10) setuid(r1) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@grpjquota='grpjquota', 0x3d}], [{@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x8004, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0xc8, "a79a46a62698f8dd15db4aea7a98a04b72d786933f7af00583e539b5361af3fc57663f66514b8490aa0419c1d9f49571c3cf8d0d52972984c84722a14fad37cef7325b6341890a17944c7bed0403b36afedf437d240fc1e21f8d73137a657197a3e85529ed63e29427ec6cb16d82c71ab6ba407480c51ae36674829ab63ebccd355bdfde77372b2f657fccd38785d651c809e0aedce6a7c130df1b0ad4292a603c0b7b4b2fca188decb75638c7209042d1c38738496d38a6b5b7555eecc4f5f71de3b0feb73d3ada"}, &(0x7f0000000000)=0xec) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x101b4e) 06:18:08 executing program 5 (fault-call:4 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3441.857023] FAULT_INJECTION: forcing a failure. [ 3441.857023] name failslab, interval 1, probability 0, space 0, times 0 [ 3441.875868] CPU: 0 PID: 25611 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3441.883789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3441.893179] Call Trace: [ 3441.895793] dump_stack+0x1fc/0x2fe [ 3441.899443] should_fail.cold+0xa/0x14 [ 3441.903539] ? setup_fault_attr+0x200/0x200 [ 3441.907876] ? lock_acquire+0x170/0x3c0 [ 3441.911876] __should_failslab+0x115/0x180 [ 3441.916128] should_failslab+0x5/0xf [ 3441.919882] kmem_cache_alloc+0x277/0x370 [ 3441.924041] __d_alloc+0x2b/0xa10 [ 3441.927514] d_alloc_pseudo+0x19/0x70 [ 3441.931323] alloc_file_pseudo+0xc6/0x250 [ 3441.935484] ? check_preemption_disabled+0x41/0x280 [ 3441.940527] ? alloc_file+0x4d0/0x4d0 [ 3441.944347] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 3441.949992] ? shmem_get_inode+0x44c/0x8d0 [ 3441.954247] __shmem_file_setup.part.0+0x102/0x2b0 [ 3441.959192] shmem_file_setup+0x61/0x90 [ 3441.963176] __se_sys_memfd_create+0x26b/0x440 [ 3441.966014] IPVS: ftp: loaded support on port[0] = 21 [ 3441.967772] ? memfd_file_seals_ptr+0x150/0x150 [ 3441.967787] ? posix_timer_fn+0x3d0/0x3d0 [ 3441.967802] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3441.967817] ? trace_hardirqs_off_caller+0x69/0x210 [ 3441.967833] ? do_syscall_64+0x21/0x620 [ 3441.967852] do_syscall_64+0xf9/0x620 [ 3441.967870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3441.967881] RIP: 0033:0x45cba9 [ 3441.967896] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3441.967903] RSP: 002b:00007fe63f54ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3441.967917] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 000000000045cba9 [ 3441.967932] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 3442.051044] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 3442.058321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 3442.065598] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 06:18:09 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x900}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:09 executing program 5 (fault-call:4 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3442.231593] Invalid UDP bearer configuration [ 3442.231616] Enabling of bearer rejected, failed to enable media [ 3442.253618] IPVS: ftp: loaded support on port[0] = 21 [ 3442.258755] FAULT_INJECTION: forcing a failure. [ 3442.258755] name failslab, interval 1, probability 0, space 0, times 0 06:18:09 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf60f) 06:18:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3442.305459] IPVS: ftp: loaded support on port[0] = 21 [ 3442.306890] Enabling of bearer rejected, already enabled [ 3442.316865] CPU: 1 PID: 25653 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3442.325077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3442.334465] Call Trace: [ 3442.337069] dump_stack+0x1fc/0x2fe [ 3442.340718] should_fail.cold+0xa/0x14 [ 3442.344622] ? setup_fault_attr+0x200/0x200 [ 3442.348978] ? lock_acquire+0x170/0x3c0 [ 3442.352977] __should_failslab+0x115/0x180 [ 3442.357241] should_failslab+0x5/0xf [ 3442.360997] kmem_cache_alloc+0x277/0x370 [ 3442.365161] __alloc_file+0x21/0x330 [ 3442.368887] alloc_empty_file+0x6d/0x170 [ 3442.372957] alloc_file+0x5e/0x4d0 [ 3442.376514] alloc_file_pseudo+0x165/0x250 [ 3442.380761] ? alloc_file+0x4d0/0x4d0 [ 3442.384572] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 3442.390304] ? shmem_get_inode+0x44c/0x8d0 [ 3442.394558] __shmem_file_setup.part.0+0x102/0x2b0 [ 3442.399509] shmem_file_setup+0x61/0x90 [ 3442.403505] __se_sys_memfd_create+0x26b/0x440 [ 3442.408108] ? memfd_file_seals_ptr+0x150/0x150 [ 3442.412792] ? posix_timer_fn+0x3d0/0x3d0 [ 3442.416956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3442.421715] ? trace_hardirqs_off_caller+0x69/0x210 [ 3442.426745] ? do_syscall_64+0x21/0x620 [ 3442.430737] do_syscall_64+0xf9/0x620 [ 3442.434591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3442.439789] RIP: 0033:0x45cba9 [ 3442.442989] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3442.462017] RSP: 002b:00007fe63f54ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3442.469735] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 000000000045cba9 [ 3442.477015] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 3442.484301] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 3442.491581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 3442.498863] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 [ 3442.513549] Enabling of bearer rejected, already enabled [ 3442.569541] IPVS: ftp: loaded support on port[0] = 21 06:18:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x27, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:09 executing program 5 (fault-call:4 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:09 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@grpjquota='grpjquota', 0x3d}], [{@dont_measure='dont_measure'}]}) r0 = semget$private(0x0, 0x3, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(r1, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000400)=[0x200]) semop(r0, &(0x7f0000000100), 0x2d) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40d00, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x50440, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000200)={r2, 0x3, 0x8, r3}) semctl$IPC_RMID(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000440)='SMC_PNETID\x00') sched_setscheduler(0x0, 0x5, 0x0) ptrace$setopts(0x4206, 0x0, 0xf6a, 0x4d) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r5, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x400) sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r5, 0x100, 0x70bd26, 0x3, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gre0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'sit0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x94}}, 0x4000040) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f00000000c0)=""/189) [ 3442.700160] IPVS: ftp: loaded support on port[0] = 21 [ 3442.742652] FAULT_INJECTION: forcing a failure. [ 3442.742652] name failslab, interval 1, probability 0, space 0, times 0 [ 3442.764739] CPU: 1 PID: 25724 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3442.772650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3442.782015] Call Trace: [ 3442.784616] dump_stack+0x1fc/0x2fe [ 3442.788263] should_fail.cold+0xa/0x14 [ 3442.792171] ? setup_fault_attr+0x200/0x200 [ 3442.796504] ? lock_acquire+0x170/0x3c0 [ 3442.800496] __should_failslab+0x115/0x180 [ 3442.804743] should_failslab+0x5/0xf [ 3442.808483] kmem_cache_alloc+0x277/0x370 [ 3442.812649] selinux_file_alloc_security+0xaf/0x190 [ 3442.817676] security_file_alloc+0x40/0x90 [ 3442.821924] __alloc_file+0xc9/0x330 [ 3442.825648] alloc_empty_file+0x6d/0x170 [ 3442.829722] alloc_file+0x5e/0x4d0 [ 3442.833293] alloc_file_pseudo+0x165/0x250 [ 3442.837541] ? alloc_file+0x4d0/0x4d0 [ 3442.841355] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 3442.846990] ? shmem_get_inode+0x44c/0x8d0 [ 3442.851248] __shmem_file_setup.part.0+0x102/0x2b0 [ 3442.856213] shmem_file_setup+0x61/0x90 [ 3442.860222] __se_sys_memfd_create+0x26b/0x440 [ 3442.864816] ? memfd_file_seals_ptr+0x150/0x150 [ 3442.869516] ? posix_timer_fn+0x3d0/0x3d0 [ 3442.873679] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3442.878452] ? trace_hardirqs_off_caller+0x69/0x210 [ 3442.883515] ? do_syscall_64+0x21/0x620 [ 3442.887493] do_syscall_64+0xf9/0x620 [ 3442.891327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3442.896503] RIP: 0033:0x45cba9 [ 3442.899684] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3442.918690] RSP: 002b:00007fe63f54ea68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3442.926430] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 000000000045cba9 [ 3442.933707] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1d11 06:18:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3442.940985] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 3442.948252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 3442.955527] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 06:18:09 executing program 5 (fault-call:4 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3443.093887] Enabling of bearer rejected, already enabled [ 3443.109017] FAULT_INJECTION: forcing a failure. [ 3443.109017] name failslab, interval 1, probability 0, space 0, times 0 [ 3443.124625] CPU: 0 PID: 25744 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3443.132530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:18:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6f02}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3443.141893] Call Trace: [ 3443.144496] dump_stack+0x1fc/0x2fe [ 3443.148133] should_fail.cold+0xa/0x14 [ 3443.152025] ? setup_fault_attr+0x200/0x200 [ 3443.156355] ? lock_acquire+0x170/0x3c0 [ 3443.160349] __should_failslab+0x115/0x180 [ 3443.164597] should_failslab+0x5/0xf [ 3443.168316] kmem_cache_alloc+0x277/0x370 [ 3443.172473] getname_flags+0xce/0x590 [ 3443.176287] do_sys_open+0x26c/0x520 [ 3443.180098] ? filp_open+0x70/0x70 [ 3443.183637] ? check_preemption_disabled+0x41/0x280 [ 3443.188658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3443.193431] ? trace_hardirqs_off_caller+0x69/0x210 [ 3443.198459] ? do_syscall_64+0x21/0x620 [ 3443.202539] do_syscall_64+0xf9/0x620 [ 3443.206344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3443.211551] RIP: 0033:0x416921 [ 3443.214733] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3443.233628] RSP: 002b:00007fe63f54ea60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3443.241330] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 0000000000416921 [ 3443.248604] RDX: 00007fe63f54eb0a RSI: 0000000000000002 RDI: 00007fe63f54eb00 [ 3443.255880] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 3443.263364] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 3443.270645] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 [ 3443.424787] IPVS: ftp: loaded support on port[0] = 21 [ 3443.511141] Enabling of bearer rejected, already enabled 06:18:11 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xa00}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:11 executing program 5 (fault-call:4 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:11 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf801) 06:18:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x7100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:11 executing program 3: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@seclabel='seclabel'}]}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x80, 0x1f, 0x83f0, "727d68e32c75e1b963b4e8abedcae1e60ef6035da7fad1fe6ca573436c8f417fa6897e366f69e374b76ce14e740de4c8dd78926fa019e64b2f265a2814de5546d07f427b65a5c01db5fc9741de64b2ba9b3c58e015855790bdd871d87f3188b190358e43cfa25080e4bf87bd78d38b5e4fe206ce3fe38d8257c7194ff496b89a"}) [ 3445.033410] IPVS: ftp: loaded support on port[0] = 21 [ 3445.049600] FAULT_INJECTION: forcing a failure. [ 3445.049600] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3445.061425] CPU: 0 PID: 25810 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3445.069416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3445.078767] Call Trace: [ 3445.081360] dump_stack+0x1fc/0x2fe [ 3445.084976] should_fail.cold+0xa/0x14 [ 3445.088854] ? setup_fault_attr+0x200/0x200 [ 3445.093198] __alloc_pages_nodemask+0x239/0x2890 [ 3445.097959] ? avc_has_perm+0x227/0x410 [ 3445.101942] ? __lock_acquire+0x6de/0x3ff0 [ 3445.106180] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3445.111020] ? current_time+0x6f/0x1c0 [ 3445.114916] ? shmem_setattr+0x2d0/0xc90 [ 3445.118987] ? timespec64_trunc+0xf2/0x190 [ 3445.123440] ? inode_init_owner+0x330/0x330 [ 3445.127763] ? fsnotify+0x706/0xe20 [ 3445.131396] cache_grow_begin+0xa4/0x8a0 [ 3445.135475] ? setup_fault_attr+0x200/0x200 [ 3445.139791] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3445.144549] cache_alloc_refill+0x273/0x340 [ 3445.148865] kmem_cache_alloc+0x346/0x370 [ 3445.152998] getname_flags+0xce/0x590 [ 3445.156796] do_sys_open+0x26c/0x520 [ 3445.160498] ? filp_open+0x70/0x70 [ 3445.164034] ? check_preemption_disabled+0x41/0x280 [ 3445.169062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3445.173810] ? trace_hardirqs_off_caller+0x69/0x210 [ 3445.178852] ? do_syscall_64+0x21/0x620 [ 3445.182836] do_syscall_64+0xf9/0x620 [ 3445.186671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3445.191869] RIP: 0033:0x416921 [ 3445.195063] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3445.214075] RSP: 002b:00007fe63f52da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3445.221795] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 0000000000416921 [ 3445.229407] RDX: 00007fe63f52db0a RSI: 0000000000000002 RDI: 00007fe63f52db00 [ 3445.236681] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 3445.243945] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 3445.251221] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f52e6d4 [ 3445.290936] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3445.321009] Enabling of bearer rejected, already enabled [ 3445.610444] IPVS: ftp: loaded support on port[0] = 21 06:18:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x4e, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x7300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:12 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xb00}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:12 executing program 5 (fault-call:4 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:12 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='grpm)kuj\x00la']) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x1c, r4, 0xab9535e9a6578fc1, 0x0, 0x0, {0x5}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x3f}]}, 0x24}}, 0x8008000) socket$inet(0x2, 0x2, 0xfffff841) 06:18:12 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf802) [ 3445.951909] FAULT_INJECTION: forcing a failure. [ 3445.951909] name failslab, interval 1, probability 0, space 0, times 0 [ 3445.963983] IPVS: ftp: loaded support on port[0] = 21 [ 3445.965240] IPVS: ftp: loaded support on port[0] = 21 [ 3445.988488] Enabling of bearer rejected, already enabled [ 3446.001265] CPU: 0 PID: 25872 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3446.009215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3446.018670] Call Trace: [ 3446.021271] dump_stack+0x1fc/0x2fe [ 3446.024918] should_fail.cold+0xa/0x14 [ 3446.028820] ? setup_fault_attr+0x200/0x200 [ 3446.033152] ? lock_acquire+0x170/0x3c0 [ 3446.037172] __should_failslab+0x115/0x180 [ 3446.041440] should_failslab+0x5/0xf [ 3446.045166] kmem_cache_alloc+0x277/0x370 [ 3446.049327] __alloc_file+0x21/0x330 [ 3446.053057] alloc_empty_file+0x6d/0x170 [ 3446.057141] path_openat+0xe9/0x2df0 [ 3446.060867] ? __lock_acquire+0x6de/0x3ff0 [ 3446.065214] ? current_time+0x6f/0x1c0 [ 3446.069116] ? path_lookupat+0x8d0/0x8d0 [ 3446.073192] ? mark_held_locks+0xf0/0xf0 [ 3446.077286] ? shmem_setattr+0x2d0/0xc90 [ 3446.081362] do_filp_open+0x18c/0x3f0 [ 3446.085170] ? may_open_dev+0xf0/0xf0 [ 3446.088984] ? __alloc_fd+0x28d/0x570 [ 3446.092800] ? lock_downgrade+0x720/0x720 [ 3446.096960] ? lock_acquire+0x170/0x3c0 [ 3446.100944] ? __alloc_fd+0x34/0x570 [ 3446.104667] ? do_raw_spin_unlock+0x171/0x230 [ 3446.109179] ? _raw_spin_unlock+0x29/0x40 [ 3446.113341] ? __alloc_fd+0x28d/0x570 [ 3446.117158] do_sys_open+0x3b3/0x520 [ 3446.120879] ? filp_open+0x70/0x70 [ 3446.124425] ? check_preemption_disabled+0x41/0x280 [ 3446.129452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3446.134219] ? trace_hardirqs_off_caller+0x69/0x210 [ 3446.140025] ? do_syscall_64+0x21/0x620 [ 3446.144008] do_syscall_64+0xf9/0x620 [ 3446.147821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3446.153048] RIP: 0033:0x416921 [ 3446.156272] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3446.175179] RSP: 002b:00007fe63f54ea60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3446.182903] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 0000000000416921 [ 3446.190181] RDX: 00007fe63f54eb0a RSI: 0000000000000002 RDI: 00007fe63f54eb00 06:18:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3446.197464] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 3446.204741] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 3446.212018] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 [ 3446.251429] Invalid UDP bearer configuration [ 3446.251464] Enabling of bearer rejected, failed to enable media 06:18:13 executing program 5 (fault-call:4 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x7900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3446.355565] IPVS: ftp: loaded support on port[0] = 21 [ 3446.401909] FAULT_INJECTION: forcing a failure. [ 3446.401909] name failslab, interval 1, probability 0, space 0, times 0 [ 3446.460340] CPU: 0 PID: 25926 Comm: syz-executor.5 Not tainted 4.19.132-syzkaller #0 [ 3446.468265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3446.477751] Call Trace: [ 3446.480408] dump_stack+0x1fc/0x2fe [ 3446.484089] should_fail.cold+0xa/0x14 [ 3446.488002] ? setup_fault_attr+0x200/0x200 [ 3446.492436] ? lock_acquire+0x170/0x3c0 [ 3446.496445] __should_failslab+0x115/0x180 [ 3446.500779] should_failslab+0x5/0xf [ 3446.506333] kmem_cache_alloc+0x277/0x370 [ 3446.510499] selinux_file_alloc_security+0xaf/0x190 [ 3446.515558] security_file_alloc+0x40/0x90 [ 3446.519803] __alloc_file+0xc9/0x330 [ 3446.523531] alloc_empty_file+0x6d/0x170 [ 3446.527605] path_openat+0xe9/0x2df0 [ 3446.532375] ? __lock_acquire+0x6de/0x3ff0 [ 3446.536624] ? current_time+0x6f/0x1c0 [ 3446.540526] ? path_lookupat+0x8d0/0x8d0 [ 3446.544634] ? mark_held_locks+0xf0/0xf0 [ 3446.548730] ? shmem_setattr+0x2d0/0xc90 [ 3446.552809] do_filp_open+0x18c/0x3f0 [ 3446.556616] ? may_open_dev+0xf0/0xf0 [ 3446.560427] ? __alloc_fd+0x28d/0x570 [ 3446.564245] ? lock_downgrade+0x720/0x720 [ 3446.568484] ? lock_acquire+0x170/0x3c0 [ 3446.572463] ? __alloc_fd+0x34/0x570 [ 3446.576178] ? do_raw_spin_unlock+0x171/0x230 [ 3446.580691] ? _raw_spin_unlock+0x29/0x40 [ 3446.584847] ? __alloc_fd+0x28d/0x570 [ 3446.588662] do_sys_open+0x3b3/0x520 [ 3446.592383] ? filp_open+0x70/0x70 [ 3446.595925] ? check_preemption_disabled+0x41/0x280 [ 3446.600969] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3446.605745] ? trace_hardirqs_off_caller+0x69/0x210 [ 3446.610768] ? do_syscall_64+0x21/0x620 [ 3446.614748] do_syscall_64+0xf9/0x620 [ 3446.618558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3446.623747] RIP: 0033:0x416921 [ 3446.626938] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3446.645870] RSP: 002b:00007fe63f54ea60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3446.653591] RAX: ffffffffffffffda RBX: 000000000050c1e0 RCX: 0000000000416921 06:18:13 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xe00}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3446.660873] RDX: 00007fe63f54eb0a RSI: 0000000000000002 RDI: 00007fe63f54eb00 [ 3446.668147] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 3446.675421] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 3446.682716] R13: 0000000000000c83 R14: 00000000004cec2c R15: 00007fe63f54f6d4 [ 3446.740511] IPVS: ftp: loaded support on port[0] = 21 06:18:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:13 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf803) [ 3446.878697] IPVS: ftp: loaded support on port[0] = 21 [ 3446.893918] Enabling of bearer rejected, already enabled [ 3447.090336] IPVS: ftp: loaded support on port[0] = 21 06:18:14 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x59, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0xff00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:14 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xf00}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3447.269845] IPVS: ftp: loaded support on port[0] = 21 [ 3447.397048] IPVS: ftp: loaded support on port[0] = 21 [ 3447.456225] Enabling of bearer rejected, already enabled 06:18:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3447.670738] IPVS: ftp: loaded support on port[0] = 21 06:18:14 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf804) 06:18:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3447.762274] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3447.832876] Invalid UDP bearer configuration [ 3447.832903] Enabling of bearer rejected, failed to enable media 06:18:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3447.915433] IPVS: ftp: loaded support on port[0] = 21 06:18:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:14 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x2000}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3448.107171] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3448.215514] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3448.245022] IPVS: ftp: loaded support on port[0] = 21 [ 3448.261455] Enabling of bearer rejected, already enabled [ 3448.441797] IPVS: ftp: loaded support on port[0] = 21 06:18:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x2, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:15 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x32d3}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf805) 06:18:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3448.785984] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3448.815281] IPVS: ftp: loaded support on port[0] = 21 [ 3448.815487] Enabling of bearer rejected, already enabled [ 3448.822333] IPVS: ftp: loaded support on port[0] = 21 [ 3448.925572] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3449.183311] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3449.299522] IPVS: ftp: loaded support on port[0] = 21 [ 3449.326405] Enabling of bearer rejected, failed to enable media 06:18:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3449.380160] IPVS: ftp: loaded support on port[0] = 21 [ 3449.451692] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf806) [ 3449.601397] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:17 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x5, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3450.155989] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3450.164973] IPVS: ftp: loaded support on port[0] = 21 [ 3450.310190] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3450.624939] Enabling of bearer rejected, failed to enable media [ 3450.665982] IPVS: ftp: loaded support on port[0] = 21 06:18:19 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x3f00}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:19 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf807) 06:18:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xf, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:19 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') mmap$snddsp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0xe000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)={0x294, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x7c, 0x8, 0x0, 0x1, [{0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x45}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45caa900}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ee03710}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c893bc2}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4af4892}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22c3c704}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3230c1eb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cdde41d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x73c4bba2}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb0, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd9dd4f4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4d8f08f4}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54aee8ea}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3409065d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52559924}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b108041}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9e}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x272449d4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd1}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4098f0b1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48827650}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x38402cf4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15534574}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67eaf65f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf4c4446}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x23858cbd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf86c}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x21f5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe279}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1af252cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6dae}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb4, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x29c32895}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43d1a68a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x16c666f}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1540f280}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x19}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x557dde6d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4dc89a12}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6855ab1a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2bf6b656}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x58}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x91}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6fa5b909}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cf04bf7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9f}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x40, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x694b00fd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x14}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6844aa09}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b6e56f6}]}]}]}, 0x294}}, 0x4000000) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) [ 3452.632269] IPVS: ftp: loaded support on port[0] = 21 [ 3452.635150] IPVS: ftp: loaded support on port[0] = 21 [ 3452.645388] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3452.681675] Enabling of bearer rejected, already enabled [ 3452.870570] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3453.003375] IPVS: ftp: loaded support on port[0] = 21 [ 3453.026038] Enabling of bearer rejected, failed to enable media [ 3453.059605] IPVS: ftp: loaded support on port[0] = 21 06:18:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3453.098404] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3453.180008] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3453.344232] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3453.448340] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:21 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept4$tipc(r0, &(0x7f0000000140)=@name, &(0x7f0000000100)=0x10, 0x800) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:21 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf808) 06:18:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x22, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:21 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x4000}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x10, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3454.791649] IPVS: ftp: loaded support on port[0] = 21 [ 3454.808181] IPVS: ftp: loaded support on port[0] = 21 06:18:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3454.844658] Enabling of bearer rejected, already enabled [ 3454.853976] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x28, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3455.070154] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3455.169942] Enabling of bearer rejected, already enabled [ 3455.172535] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3455.244005] IPVS: ftp: loaded support on port[0] = 21 06:18:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3455.302698] IPVS: ftp: loaded support on port[0] = 21 06:18:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3455.455118] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:22 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6772706a71756b74613d7365636c6162656c2c00d925c453981976c558f4b9686442eb"]) 06:18:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf809) [ 3455.577411] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3455.739044] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3455.801522] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:25 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0x6000}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3458.292457] IPVS: ftp: loaded support on port[0] = 21 [ 3458.343319] Enabling of bearer rejected, already enabled [ 3458.360256] IPVS: ftp: loaded support on port[0] = 21 06:18:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x11, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:25 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x2090000, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf80a) 06:18:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:25 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xd332}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3458.629091] IPVS: ftp: loaded support on port[0] = 21 [ 3458.665463] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3458.668727] Enabling of bearer rejected, already enabled [ 3458.678887] IPVS: ftp: loaded support on port[0] = 21 06:18:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x70, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:25 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000001c0)={0x8, 0x10000}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6772aff99eccf68626736563c1335707f9ce07bf6c6162656c2c00cf10088b2c7ce4f44b2bbc6f6cd6c050058d890cc73c781c94408ed2f65813c9867f86437c187d286d20021b1e50d5e270a4f5060339814bc94935b2326bef5ca1a326b73c052e2bff4071958d7e4bf5a1e48779f5fbb086ce5d5b1d405540"]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8004, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket(0x10, 0x803, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r7) r8 = gettid() sendmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r8, 0x0, r7}}}], 0x20}, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0xfffffffffffffffc, 0x5, {{0x1, 0x0, 0x40, 0x9, 0x100, 0x3, {0x1, 0x1, 0x4d, 0x2084, 0x0, 0x2, 0x80000001, 0x1f, 0x7, 0x9, 0x6b, r4, r7, 0x7fffffff, 0x1}}, {0x0, 0x1a}}}, 0xa0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000000)=ANY=[], 0xfffffecc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r9, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 3458.933235] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3459.002897] IPVS: ftp: loaded support on port[0] = 21 06:18:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xb4, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3459.115066] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3459.255247] Enabling of bearer rejected, failed to enable media [ 3459.286045] IPVS: ftp: loaded support on port[0] = 21 06:18:26 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x25, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xba, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:26 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xf000}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26f}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:26 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf80b) [ 3459.662499] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3459.675732] IPVS: ftp: loaded support on port[0] = 21 06:18:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xda, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3459.704427] Enabling of bearer rejected, already enabled [ 3459.728087] IPVS: ftp: loaded support on port[0] = 21 06:18:26 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="676162656ce00089afd45504a132d42947e54304ba67b39986ce157d1abb17c446000a179cf5d0cd31efb7ca0b7b8107c1b5d64f30e44510d7cbcb6012a2572e53d7ff92ec29"]) syz_mount_image$cifs(&(0x7f00000000c0)='cifs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="a7b65174a8adf878b4f0462bd74ab30788dd7e86e99bc5de17afc55f1e5116c2886be5924d11bc8c310565625aa5188abc0743e9fc24488eab605a55afd2af38da14c6a57cbeaeacc64ca1cbaecd73c666db", 0x52, 0x3}, {&(0x7f00000001c0)="0c6453a3e62ef042f00293dafc3f2df3cb8726", 0x13, 0x9}], 0x104800, &(0x7f0000000240)='reiserfs\x00') 06:18:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:26 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x8004, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) splice(r6, 0x0, r8, 0x0, 0x8004, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)={r0, r6}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@grpjquota='grpjquota', 0x3d}], [{@uid_lt={'uid<', r9}}]}) [ 3459.967471] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3459.993854] IPVS: ftp: loaded support on port[0] = 21 06:18:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xde, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3460.218853] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3460.249646] Enabling of bearer rejected, failed to enable media [ 3460.288404] IPVS: ftp: loaded support on port[0] = 21 06:18:27 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x27, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xec, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:27 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x3, 0x0, 0xffff}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:27 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xf80c) 06:18:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3460.799206] IPVS: ftp: loaded support on port[0] = 21 [ 3460.802789] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3460.815441] Enabling of bearer rejected, already enabled 06:18:27 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)) r0 = getpid() r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000001c0)={r2, 0xa2db, 0x3f, 0x3}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, @bcast, @bpq0='bpq0\x00', 0x8, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) sched_setscheduler(r0, 0x5, 0x0) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100), &(0x7f0000000180)=0x18) [ 3460.857579] IPVS: ftp: loaded support on port[0] = 21 06:18:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xf6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3461.110392] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1018}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:28 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) openat$cgroup_freezer_state(r2, &(0x7f0000000100)='freezer.state\x00', 0x2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x8004, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f00000000c0)={0x4, 0x1, 0x10001, 0x8}) 06:18:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x104, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3461.207616] IPVS: ftp: loaded support on port[0] = 21 [ 3461.376562] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3461.475327] Enabling of bearer rejected, failed to enable media [ 3461.497856] IPVS: ftp: loaded support on port[0] = 21 06:18:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x2c, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x124, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3461.911776] IPVS: ftp: loaded support on port[0] = 21 [ 3461.927021] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3462.012808] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3462.225256] Enabling of bearer rejected, already enabled [ 3462.255430] IPVS: ftp: loaded support on port[0] = 21 [ 3462.574678] Enabling of bearer rejected, already enabled 06:18:30 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x3, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20000) 06:18:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x12a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:30 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000001200)="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", 0x1008, 0x22000800, &(0x7f0000001180)=@vsock={0x28, 0x0, 0x2711}, 0x80) 06:18:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x4e, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3463.534925] IPVS: ftp: loaded support on port[0] = 21 [ 3463.557078] IPVS: ftp: loaded support on port[0] = 21 [ 3463.566782] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:30 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x9, 0x3, 0x1f8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0x8, 0x10, [0x11, 0xa, 0x3c, 0x21, 0x26, 0x22, 0x2e, 0x1c, 0x15, 0x2f, 0x11, 0x39, 0x12, 0xc, 0x23, 0x28], 0x1, 0xfc, 0x88}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000580)={0x54, 0x0, &(0x7f0000000440)=[@exit_looper, @dead_binder_done, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000380)={@fda={0x66646185, 0x9, 0x0, 0x10}, @flat=@weak_handle={0x77682a85, 0xa, 0x3}, @fda={0x66646185, 0x7, 0x1, 0xe}}, &(0x7f0000000400)={0x0, 0x20, 0x38}}}], 0x8f, 0x0, &(0x7f00000004c0)="8bc60e81c53335c707ee3d94d8f19e5502e69e82a65c99a797f4e16aa33a1b7433d8c5e53915415e7a59fa73789e33e2513fd7916ffab313de52b1bd9f2c565028e255d5653066a58eb548d1c732860b5ced71935ae7ea62d93231bdd51d573df26134f714e273be3cd337cbf03d6d509a2a465bbbc162183d0395de688a7c744eef6a670aabc48a9b6e6519e37f4e"}) [ 3463.613593] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3463.678878] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x140, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3463.831511] IPVS: ftp: loaded support on port[0] = 21 [ 3463.928892] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3463.961092] Enabling of bearer rejected, failed to enable media 06:18:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3463.985495] IPVS: ftp: loaded support on port[0] = 21 [ 3464.025273] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:32 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x18, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x160, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x30000) 06:18:32 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6772706a7101000000000000006c616215ce249ea883f4635d6d2fb4656c2c00"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket(0x10, 0x803, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r7) r8 = gettid() sendmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r8, 0x0, r7}}}], 0x20}, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x80, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r7, @ANYBLOB=',blksize=0x0000000000000000,allow_other,allow_other,default_permissions,blksize=0x0000000000000200,fowner=', @ANYRESDEC=r10, @ANYBLOB=',pcr=00000000000000000058,fscontext=system_u,\x00']) [ 3466.091225] IPVS: ftp: loaded support on port[0] = 21 [ 3466.143213] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3466.164629] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3466.217161] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3466.434426] IPVS: ftp: loaded support on port[0] = 21 06:18:33 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x59, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x16a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:33 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x44, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3466.791739] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3466.819694] IPVS: ftp: loaded support on port[0] = 21 [ 3466.832584] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 06:18:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3466.843683] IPVS: ftp: loaded support on port[0] = 21 06:18:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x170, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:33 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)={0x2b0, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0x48, 0x8, 0x0, 0x1, [{0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34103a7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x465fdac3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1663635e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x78}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e94f4f6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5888b06e}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0xadf2e4633cdb4ad9}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x118, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17bc467a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a80cd35}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1eea0fed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1cc8e428}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x94}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xf18b69f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xce}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x505eeb74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x395dfd87}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe2}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d0ef92d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x16ef2ac0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ef04051}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x42}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x493ab7fd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5e6b7533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c86931f}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70fa2c68}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x8c, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x88a3cf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xce}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x42998659}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbc}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x360cafa7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x83}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47fb088f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47835b11}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4b}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e11d383}]}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x4040}, 0x24008801) 06:18:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x34000) [ 3466.932486] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3466.960902] Enabling of bearer rejected, already enabled 06:18:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3467.092375] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x17a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3467.230496] IPVS: ftp: loaded support on port[0] = 21 06:18:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3467.317216] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x17c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3467.509478] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3467.544703] Enabling of bearer rejected, failed to enable media [ 3467.563333] IPVS: ftp: loaded support on port[0] = 21 [ 3467.654870] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3467.881782] Enabling of bearer rejected, already enabled 06:18:34 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x79d, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x18e, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:34 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x74, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:34 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x7, &(0x7f0000002400)=[{&(0x7f0000000140)="071a7927a25056a7b4fe6e02f853226f811a3933", 0x14, 0x7fffffff}, {&(0x7f0000000180)="326dad2cca22b366bf5480f232dcaaa28678a8845caf95e69ef9a8664700b49866d47e3a60673d5275469d2b98c0b1ddfb10f7b041f318bcb61cacbe4379e091e4ff", 0x42, 0x1}, {&(0x7f0000000200)="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", 0x1000, 0x5}, {&(0x7f0000001200)="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", 0x1000}, {&(0x7f0000002200)="a1b5826d1a49e80e94938fbc67b2ae7199d0af85f836b945d5984af9be81396856ea380c572bbb0adfcca857793a9b53afd8d349c827af580e38400271719c6d8007", 0x42, 0x393}, {&(0x7f0000002280)="3875f56a322df21839474d67f6ccedb20cc653582d9afcc943e0d636fe4b543854bee4324f6bdd5377bbe5ad5d1cfa5bc9429dd9f069bd51460435b0cd32cb7db7c23921332ba775c0649bfd2d6cd14fd5dd84171cdfa6cdced48a0e13d6fa7259f833956dd794fa275c4b3c593c9b3e15ed957d2e069f234108af0aeba235c3919cf9f57dfd2655422f6f25bfc9d5b8053226bf8027353a4633f87b4166d91548188d72e82cfa86b5676a590fc453a331cf56da9e2580c6cbf2d42787f6b2dba08de71ef23b709cc42e1789b5969c1066391e56d2ac4b8f249fd8dd1b", 0xdd, 0x7}, {&(0x7f0000002380)="bdead604bd2ef37cb274b981c4e2fe7834ac7cdddea406b275cff01ead8376974412d3a4993b8a154c755285d074f87f87a273c922494c51453f1e73952988f8f328363ffdac83ac78527428bb4df627594cf77b2351", 0x56, 0xa94}], 0x882000, &(0x7f00000024c0)={[{@map_acorn='map=acorn'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_lt={'euid<', r1}}]}) 06:18:34 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x40000) 06:18:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3468.093894] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3468.112923] IPVS: ftp: loaded support on port[0] = 21 [ 3468.114458] IPVS: ftp: loaded support on port[0] = 21 [ 3468.130219] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:18:35 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) [ 3468.213722] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x19a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:35 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 06:18:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3468.437614] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3468.496924] IPVS: ftp: loaded support on port[0] = 21 06:18:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1b6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3468.652147] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3468.678371] Enabling of bearer rejected, failed to enable media [ 3468.714678] IPVS: ftp: loaded support on port[0] = 21 06:18:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0x1267, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f02}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1d6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:35 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:35 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x50000) [ 3469.063694] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3469.067314] IPVS: ftp: loaded support on port[0] = 21 06:18:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3469.108178] IPVS: ftp: loaded support on port[0] = 21 [ 3469.194388] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:36 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40002, &(0x7f0000000000)=ANY=[@ANYBLOB='grpjquota=sfclabel,\x00']) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000002c0)={0x0, 0x3, 0x1000, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x98092a, 0x8, [], @p_u16=&(0x7f0000000240)=0x9}}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r4, 0x0, r6, 0x0, 0x8004, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0xb11, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x9, 0x1}, 0x0, 0x0, &(0x7f0000000400)={0x4, 0x5, 0x9, 0x1}, &(0x7f0000000440)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x8}}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) splice(r8, 0x0, r10, 0x0, 0x8004, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1c, 0x1, &(0x7f00000000c0)=@raw=[@ldst={0x0, 0x2, 0x6, 0x5, 0x3, 0x0, 0xfffffffffffffff0}], &(0x7f0000000100)='GPL\x00', 0x17b8, 0xec, &(0x7f0000000140)=""/236, 0x41000, 0xd, [], 0x0, 0x12, r3, 0x8, &(0x7f0000000300)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0xffff, 0x3d9a}, 0x10, r7, r8}, 0x78) 06:18:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1da, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3469.509267] IPVS: ftp: loaded support on port[0] = 21 [ 3469.517324] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7900}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1fe, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3469.637948] Enabling of bearer rejected, failed to enable media [ 3469.680948] IPVS: ftp: loaded support on port[0] = 21 [ 3469.746473] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3469.853642] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x60000) [ 3470.202056] IPVS: ftp: loaded support on port[0] = 21 [ 3470.486757] Started in network mode [ 3470.490583] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3470.505748] Enabling of bearer rejected, failed to enable media [ 3470.529009] IPVS: ftp: loaded support on port[0] = 21 06:18:38 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x4, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x202, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x8004, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000280)=0xffffffffffffff05) setuid(r4) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nolargeio='nolargeio', 0x3d}], [{@fowner_gt={'fowner>', r4}}]}) 06:18:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x2, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x70000) [ 3471.936518] Left network mode [ 3472.009394] IPVS: ftp: loaded support on port[0] = 21 [ 3472.025980] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x208, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3472.084528] IPVS: ftp: loaded support on port[0] = 21 06:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3472.232271] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x210, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3472.363918] IPVS: ftp: loaded support on port[0] = 21 [ 3472.434464] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x21a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3472.532428] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:39 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x8, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3472.579116] Started in network mode [ 3472.582911] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3472.592028] Enabling of bearer rejected, failed to enable media [ 3472.660396] IPVS: ftp: loaded support on port[0] = 21 06:18:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3472.744537] IPVS: ftp: loaded support on port[0] = 21 [ 3472.767874] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:39 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="677270ea71756f74613d7365636c616200000000"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8004, 0x0) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0xb, 0x6, 0x307, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x8001}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x4}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x8}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x7}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x4810) r3 = gettid() ptrace$poke(0x5, r3, &(0x7f00000000c0), 0x3ff000000000000) 06:18:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x80000) [ 3472.904869] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3473.141235] IPVS: ftp: loaded support on port[0] = 21 06:18:42 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x3, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000340)={0x30, 0x20, 0x8b73102c764253c5, 0x0, 0x0, "", [@nested={0x20, 0x0, 0x0, 0x1, [@typed={0xc, 0x125, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0x30}], 0x1}, 0x0) 06:18:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x22c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:42 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x90000) 06:18:42 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0xa, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3475.428488] IPVS: ftp: loaded support on port[0] = 21 06:18:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='uid_map\x00') preadv(r0, &(0x7f0000001700)=[{&(0x7f0000000200)=""/257, 0x101}], 0x1, 0x21) 06:18:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3475.450445] IPVS: ftp: loaded support on port[0] = 21 [ 3475.460984] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x22e, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000080)="0201550000250a100000ff45ac0000ffffff8100080000000000000002400000000063000000e10000008877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 06:18:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3475.755968] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8f2", 0x17}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x800) [ 3475.805663] IPVS: ftp: loaded support on port[0] = 21 [ 3476.005327] Started in network mode [ 3476.012300] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3476.034803] Enabling of bearer rejected, failed to enable media [ 3476.058340] IPVS: ftp: loaded support on port[0] = 21 [ 3476.254787] Enabling of bearer rejected, already enabled 06:18:43 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x4, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x236, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:18:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:43 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xa0000) [ 3476.449269] IPVS: ftp: loaded support on port[0] = 21 [ 3476.473832] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3476.568482] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3476.852337] Started in network mode [ 3476.856095] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3476.890171] Enabling of bearer rejected, failed to enable media [ 3476.931553] IPVS: ftp: loaded support on port[0] = 21 [ 3476.982255] Enabling of bearer rejected, already enabled 06:18:45 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x15, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:45 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) 06:18:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x25a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:45 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x5, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:45 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xb0000) [ 3478.277525] IPVS: ftp: loaded support on port[0] = 21 06:18:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3478.337379] IPVS: ftp: loaded support on port[0] = 21 [ 3478.375270] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:45 executing program 3: unshare(0x44000600) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'syzkaller1\x00', {0x2, 0x0, @private=0xa010101}}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8918, &(0x7f0000000240)={'syzkaller1\x00', {0x2, 0x0, @dev}}) 06:18:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3478.489674] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x260, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3478.690642] IPVS: ftp: loaded support on port[0] = 21 [ 3478.710022] IPVS: ftp: loaded support on port[0] = 21 [ 3478.726052] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18100000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3478.832449] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3478.893812] Started in network mode [ 3478.906668] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3478.929527] Enabling of bearer rejected, failed to enable media [ 3478.960922] Left network mode [ 3478.977005] IPVS: ftp: loaded support on port[0] = 21 [ 3478.981203] Left network mode [ 3479.012937] Enabling of bearer rejected, already enabled [ 3479.022064] Left network mode [ 3479.063434] IPVS: ftp: loaded support on port[0] = 21 06:18:47 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x25, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x26e, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:47 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xc0000) [ 3480.924245] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3480.994568] IPVS: ftp: loaded support on port[0] = 21 [ 3481.184796] IPVS: ftp: loaded support on port[0] = 21 06:18:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x6, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/152, 0x98}], 0x1, 0xff1) 06:18:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x272, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:48 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x47, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3481.425039] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3481.438474] IPVS: ftp: loaded support on port[0] = 21 [ 3481.465315] IPVS: ftp: loaded support on port[0] = 21 06:18:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x294, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 06:18:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3481.663368] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0xd0000) 06:18:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x26}, 0x1c) bind$inet6(r2, &(0x7f0000f13000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 3481.767487] IPVS: ftp: loaded support on port[0] = 21 [ 3481.777396] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3481.963860] Started in network mode [ 3481.967759] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3481.985024] Enabling of bearer rejected, failed to enable media [ 3482.018272] IPVS: ftp: loaded support on port[0] = 21 06:18:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x29e, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:49 executing program 3: lsetxattr(&(0x7f0000fc0000)='.\x00', &(0x7f0000000040)=@random={'user.', 'user.\xfb\xde\xa3\xd1\x14]\x87\xe2U\xbd\xba\xe6B*\x81\x86Q)G\xda\v~\x1dD(3U$\xe1\x9f\x91\x92\xb9\xdeh\x8e\f\xe8\xc5\x15\x98\xba\x0fu\xa1\xb0$\xf6\xfe\xb4\xe8\x95\xdb\x11'}, &(0x7f0000fc0000)='//selinux\x00\x00\x01\x10', 0xd, 0x1) 06:18:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:49 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x7, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3482.574135] IPVS: ftp: loaded support on port[0] = 21 [ 3482.579954] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3482.928907] Started in network mode [ 3482.932725] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3482.946119] Enabling of bearer rejected, failed to enable media [ 3482.962279] IPVS: ftp: loaded support on port[0] = 21 [ 3483.029669] Enabling of bearer rejected, already enabled 06:18:50 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x300, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:50 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0xc0242, 0x0) fallocate(r1, 0x11, 0x10001, 0x13dec679) 06:18:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2a6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:50 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x400300) 06:18:50 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x8, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_GETNSID={0x14, 0x5a, 0x305}, 0x14}}, 0x0) [ 3483.895793] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3483.901645] IPVS: ftp: loaded support on port[0] = 21 [ 3483.926684] IPVS: ftp: loaded support on port[0] = 21 06:18:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2ac, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:51 executing program 3: 06:18:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:51 executing program 3: [ 3484.228050] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3484.263257] IPVS: ftp: loaded support on port[0] = 21 [ 3484.413015] Left network mode [ 3484.419662] Started in network mode [ 3484.423497] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3484.434245] Enabling of bearer rejected, failed to enable media [ 3484.449971] Left network mode [ 3484.460734] Left network mode [ 3484.473147] IPVS: ftp: loaded support on port[0] = 21 [ 3484.599709] Enabling of bearer rejected, already enabled 06:18:52 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x3a7, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2ae, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:52 executing program 3: 06:18:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x9, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:52 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x6b6b6b) 06:18:52 executing program 3: [ 3485.921381] IPVS: ftp: loaded support on port[0] = 21 06:18:52 executing program 3: [ 3485.963643] IPVS: ftp: loaded support on port[0] = 21 [ 3485.984144] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:53 executing program 3: 06:18:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c4, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3486.259421] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3486.373528] IPVS: ftp: loaded support on port[0] = 21 [ 3486.380138] Started in network mode [ 3486.390182] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3486.415864] Enabling of bearer rejected, failed to enable media [ 3486.462664] IPVS: ftp: loaded support on port[0] = 21 06:18:54 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:54 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x96, &(0x7f0000000500)="f7f249b9740c9e57f4f22a160500000032a5b60a00008024c30e478947d190ac00000000000000000000000000000000663697ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4b0d8b9aad9c9ba4c998db2f64eb12c07af20200169c864e1d5f8179cba2e431126de0592738cb993815a7d1b1ce34144ce1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a5f2cc05e"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 06:18:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c8, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f020000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:54 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x1000000) 06:18:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xa, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3488.001479] IPVS: ftp: loaded support on port[0] = 21 [ 3488.020268] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3488.035246] Enabling of bearer rejected, already enabled [ 3488.069427] IPVS: ftp: loaded support on port[0] = 21 06:18:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2e6, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3488.265126] IPVS: ftp: loaded support on port[0] = 21 [ 3488.313306] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2ee, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3488.555895] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3488.586020] Started in network mode [ 3488.598522] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3488.630642] Enabling of bearer rejected, failed to enable media [ 3488.667929] IPVS: ftp: loaded support on port[0] = 21 [ 3488.739542] Enabling of bearer rejected, already enabled [ 3489.846438] Left network mode 06:18:56 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x0, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3489.953883] IPVS: ftp: loaded support on port[0] = 21 [ 3489.993325] Left network mode [ 3490.000136] Started in network mode [ 3490.003859] Own node identity 60000000000000000000ffffac1e0002, cluster identity 4711 [ 3490.013837] Enabling of bearer rejected, failed to enable media [ 3490.026562] IPVS: ftp: loaded support on port[0] = 21 [ 3490.041254] Left network mode 06:18:57 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xba, &(0x7f0000000300)="f7f249b9740c9e57f4f22a160500000032a5b60a00008024c30e478947d190ac00000000000000000000000000000000663697ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4b0d8b9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb12c07af20200169c864e1d5f8179cba2e431126de0592738cb993815a7d1b1ce34144ce1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a5f2cc05e4b942d6ed155b67a555f4b2e2b0cd0e93e41c330f70401"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 06:18:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2fa, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:57 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x2000000) 06:18:57 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xb, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:18:57 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x3, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3490.984463] IPVS: ftp: loaded support on port[0] = 21 [ 3490.988995] IPVS: ftp: loaded support on port[0] = 21 [ 3491.041196] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3491.052602] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3491.174399] Enabling of bearer rejected, already enabled 06:18:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2fc, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3491.282306] IPVS: ftp: loaded support on port[0] = 21 [ 3491.345194] IPVS: ftp: loaded support on port[0] = 21 [ 3491.355472] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3491.522188] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:18:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:18:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:18:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3491.760394] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:00 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x92, &(0x7f0000000500)="f7f249b9740c9e57f4f22a160500000032a5b60a00008024c30e478947d190ac00000000000000000000000000000000663697ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4b0d8b9aad9c9ba4c998db2f64eb12c07af20200169c864e1d5f8179cba2e431126de0592738cb993815a7d1b1ce34144ce1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 06:19:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x31c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x4000000) 06:19:00 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xf, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:00 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x47, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3494.006405] Left network mode [ 3494.024087] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3494.051660] IPVS: ftp: loaded support on port[0] = 21 06:19:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x33c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3494.109878] IPVS: ftp: loaded support on port[0] = 21 06:19:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:01 executing program 3: msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000000c0)=""/133) [ 3494.267280] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:01 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)={0x484, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1}, @NL80211_ATTR_MESH_SETUP={0xc, 0x70, [@NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5, 0x6, 0x1}]}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_TX_RATES={0x80, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x1c, 0x2, [@NL80211_TXRATE_LEGACY={0x18, 0x1, "1b9cbb967cc5954cf4184711052e39cd4049fe2a"}]}, @NL80211_BAND_2GHZ={0x60, 0x0, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x3f, 0x7, 0x0, 0x968, 0x171d, 0x0, 0xff01, 0x1000]}}, @NL80211_TXRATE_HT={0x31, 0x2, "02fa641cdd4844d6cfca32560491a2ff41326945e4b1ce571b2ea8898dee28a1e4fea4dd761518374542bef619"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff, 0x6ed7, 0x1, 0x8, 0xa19, 0x53b, 0x0, 0x7c]}}]}]}, @NL80211_ATTR_BSS_BASIC_RATES={0x72, 0x24, "ef7b3b8c091e0198c93c09adb23f116bc82e815189fd4b8a860d3cc3fbbd537e16229c8e713a24d92a740917fbe89367b39ac60b706842e13700804d99fd3b392785c4877da153e2703fdb58d6249c974b58fa32542078ba2aa7c3fc8697e80a3107f13620e401da642025cd3802"}, @NL80211_ATTR_MESH_SETUP={0x4}, @NL80211_ATTR_TX_RATES={0x1a0, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0xc8, 0x2, [@NL80211_TXRATE_HT={0x31, 0x2, "8a73460b877eab0a228fe5f2d3565cebdc90b1779143617523c64a6e691287986f23ddfb3154c987b984cbd3d1"}, @NL80211_TXRATE_LEGACY={0x6, 0x1, ':('}, @NL80211_TXRATE_HT={0x26, 0x2, "bea5a4972f66f6be53bb1afd7906a37cdcc8d5c84c43f3387049c2bd9179f5750ead"}, @NL80211_TXRATE_LEGACY={0x9, 0x1, "e14c753c9f"}, @NL80211_TXRATE_LEGACY={0x19, 0x1, "47c9e4af80bd89f182430c080cf085eb309a8b2de4"}, @NL80211_TXRATE_LEGACY={0x22, 0x1, "b078f1923922d23f1dab1e42cb3282ee5f81962d9971b80e40b29e2f892b"}, @NL80211_TXRATE_LEGACY={0x12, 0x1, "d418b5488e256f912589b50ea4a7"}]}, @NL80211_BAND_2GHZ={0x18, 0x0, [@NL80211_TXRATE_HT={0x11, 0x2, "438af97420b4e0adc946085d79"}]}, @NL80211_BAND_5GHZ={0x34, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x9, 0x6, 0x80, 0x1000, 0x7, 0x2, 0x3]}}, @NL80211_TXRATE_LEGACY={0x19, 0x1, "b4fad3a8e63705910a76237946a3554b1f68add12e"}]}, @NL80211_BAND_6GHZ={0x88, 0x3, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x100, 0x7, 0xec, 0x0, 0x0, 0xfffc, 0x3]}}, @NL80211_TXRATE_HT={0x3d, 0x2, "db935f6b6172ec22a114c4ab4722f4f498572a514d70b5155c2c344e4930784382ca04912fcdbbb8b4201821b818d45bddfc5792df624e727c"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x0, 0x1f, 0x80, 0x40, 0x0, 0x40, 0x8001]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x12, 0x2, "a51393e003ca9835381c71342ce0"}]}]}, @NL80211_ATTR_TX_RATES={0x1c0, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x50, 0x1, [@NL80211_TXRATE_HT={0x3c, 0x2, "17ea1daad8c0c7a602ba8a26a5b691fc7d3524da62b7baa1f2cb2139fa1420810329d14685b037015bc33b92bcb2183ff7c72a5a2553aac4"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0x28, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0xc, 0x1, "0366dda7a04c05e3"}]}, @NL80211_BAND_60GHZ={0x80, 0x2, [@NL80211_TXRATE_HT={0x16, 0x2, "e5aaf1972d3e8bfdbfe03e1b0041974db373"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9d7, 0x8, 0x38c5, 0x4, 0x1, 0x7, 0x0, 0x2283]}}, @NL80211_TXRATE_LEGACY={0x13, 0x1, "276479c0be9cf9ba8f455aa852a298"}, @NL80211_TXRATE_HT={0xb, 0x2, "7c569dd0e1acea"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2c0, 0x0, 0xffff, 0x8, 0x2, 0x9, 0x8, 0x14]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfffb, 0x8001, 0x0, 0x2d, 0x0, 0x6]}}]}, @NL80211_BAND_5GHZ={0x28, 0x1, [@NL80211_TXRATE_HT={0x4}, @NL80211_TXRATE_LEGACY={0x18, 0x1, "2ca04e55a8dee53e81d8153b6c6061a409c16f49"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0xc, 0x2, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x28, 0x2, [@NL80211_TXRATE_HT={0x12, 0x2, "6ec1bf7609ec9dd7a1f9b3f370c2"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x68, 0x0, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x8, 0xae, 0x5, 0x0, 0x2, 0xfff, 0x2]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xffff, 0x0, 0xa84, 0x5a, 0x3, 0x1000, 0x20, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0xfff8, 0x4, 0x3ff, 0x0, 0x101, 0x7, 0x2]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x3, 0x55, 0x1, 0x0, 0x6, 0x401, 0x3]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x9, 0x1, "ac05cc1e81"}]}]}]}, 0x484}, 0x1, 0x0, 0x0, 0x9}, 0x821668f90c4aa952) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3494.407646] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3494.453313] Started in network mode [ 3494.457223] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3494.475016] Enabling of bearer rejected, failed to enable media 06:19:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x4, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x34a, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3494.567595] IPVS: ftp: loaded support on port[0] = 21 [ 3494.613439] IPVS: ftp: loaded support on port[0] = 21 06:19:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x5, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3494.680124] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3494.694105] Enabling of bearer rejected, already enabled [ 3494.797659] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x7, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:01 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x7000000) 06:19:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x10, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x374, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0xc, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:03 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c466000002ed8e4f96765ce27b90300060000000000000000b738000000000035f4c38422a3bc822000050000000402030000000000000050000400b3d7c52ebf31a897ff080000000000090000f8ffffffffffffff03000000000000000d60395a7088d7c27f000000a1010001007ea85ca6574c9a992da4880348d1"], 0xd8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 06:19:03 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x54, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:03 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8000000) [ 3496.459409] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:03 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x8002f72cbb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0x20000000) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r0, r1) 06:19:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x37c, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0xf, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3496.562897] IPVS: ftp: loaded support on port[0] = 21 [ 3496.614726] IPVS: ftp: loaded support on port[0] = 21 [ 3496.743059] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x10, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:03 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) 06:19:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x380, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3496.947233] IPVS: ftp: loaded support on port[0] = 21 [ 3497.015761] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3497.102198] Started in network mode [ 3497.106073] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3497.138323] Enabling of bearer rejected, failed to enable media [ 3497.158103] IPVS: ftp: loaded support on port[0] = 21 [ 3497.233001] Started in network mode [ 3497.237334] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3497.260841] Enabling of bearer rejected, failed to enable media 06:19:04 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x11, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x14, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x382, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000280)=""/241) 06:19:04 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x2, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:04 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8020000) 06:19:04 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x2) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/108, 0x6c}], 0x1) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 06:19:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x15, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3497.462228] IPVS: ftp: loaded support on port[0] = 21 [ 3497.477909] IPVS: ftp: loaded support on port[0] = 21 [ 3497.500499] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3497.587911] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x398, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x17, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3497.862421] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3497.873928] IPVS: ftp: loaded support on port[0] = 21 06:19:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x1c, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3497.986646] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3a4, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3498.055936] Started in network mode [ 3498.063342] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3498.085691] Enabling of bearer rejected, failed to enable media [ 3498.135921] IPVS: ftp: loaded support on port[0] = 21 [ 3498.155427] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3498.254606] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3498.496329] Left network mode 06:19:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x3a, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x1d, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8030000) 06:19:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3cc, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3498.632551] IPVS: ftp: loaded support on port[0] = 21 [ 3498.647368] Left network mode [ 3498.682269] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3498.724005] Left network mode [ 3498.742762] Left network mode [ 3498.815533] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3499.005010] Started in network mode [ 3499.008952] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3499.017835] Enabling of bearer rejected, failed to enable media [ 3499.044629] IPVS: ftp: loaded support on port[0] = 21 06:19:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x24, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:07 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) 06:19:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f8, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:07 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8040000) 06:19:07 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x4, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:07 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x48, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3500.142117] IPVS: ftp: loaded support on port[0] = 21 06:19:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x25, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3500.174399] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:07 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) [ 3500.239426] IPVS: ftp: loaded support on port[0] = 21 06:19:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fa, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x27, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3500.452802] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fc, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:07 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:19:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x2c, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3500.628299] IPVS: ftp: loaded support on port[0] = 21 [ 3500.662238] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x2d, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3500.776575] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3500.798368] Started in network mode [ 3500.802191] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 06:19:07 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) [ 3500.830528] Enabling of bearer rejected, failed to enable media [ 3500.926980] IPVS: ftp: loaded support on port[0] = 21 06:19:07 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8050000) 06:19:07 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x8, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3501.099639] IPVS: ftp: loaded support on port[0] = 21 06:19:08 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x4c, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fe, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x2f, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:08 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x2, 0x6, 0x0, 0x0, 0x0, 0x10}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3501.302854] IPVS: ftp: loaded support on port[0] = 21 [ 3501.421054] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x34, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3501.474159] IPVS: ftp: loaded support on port[0] = 21 06:19:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 3501.566905] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 3501.567479] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000700)="f17892134c13bf3520774a0e564792403be082a3cd22431d5e2a54f1ae631d726ffebab3155598ac36d9e2581a795bf3bfd1ef01579f36dcd0764b48e4a4cc4b9dd4b05851ea6329ad5fb5dd8a89550c167cdd5bc9362ff1978724aa43ccda5982") 06:19:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x35, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x37, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3501.811263] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:08 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8060000) [ 3501.943010] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3502.024687] Started in network mode [ 3502.029247] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3502.044995] Enabling of bearer rejected, failed to enable media [ 3502.072939] IPVS: ftp: loaded support on port[0] = 21 [ 3504.246441] Left network mode 06:19:11 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0xa, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x3c, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:11 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x60, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:11 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8070000) 06:19:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x3d, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3504.374817] IPVS: ftp: loaded support on port[0] = 21 [ 3504.388068] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3504.428125] IPVS: ftp: loaded support on port[0] = 21 [ 3504.460281] Left network mode [ 3504.502725] Left network mode [ 3504.509585] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3504.753497] IPVS: ftp: loaded support on port[0] = 21 [ 3504.783169] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3504.851570] Started in network mode [ 3504.855458] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3504.873423] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3504.881736] Enabling of bearer rejected, failed to enable media [ 3504.951313] IPVS: ftp: loaded support on port[0] = 21 06:19:12 executing program 3: r0 = timerfd_create(0x0, 0x0) close(r0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:19:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x44, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x802, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:12 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8080000) 06:19:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x68, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3505.668748] IPVS: ftp: loaded support on port[0] = 21 [ 3505.688794] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3505.950840] Started in network mode [ 3505.954594] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3505.963479] Enabling of bearer rejected, failed to enable media [ 3505.990229] IPVS: ftp: loaded support on port[0] = 21 [ 3506.220256] Enabling of bearer rejected, already enabled 06:19:14 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x15, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:14 executing program 3: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f0000000280)=""/248, 0xf8, 0x2) 06:19:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x45, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:14 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x8090000) 06:19:14 executing program 3: [ 3507.235249] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3507.286086] IPVS: ftp: loaded support on port[0] = 21 06:19:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x47, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:14 executing program 3: [ 3507.391472] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x4c, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:14 executing program 3: [ 3507.610877] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3507.632854] IPVS: ftp: loaded support on port[0] = 21 [ 3507.720883] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x6c, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:15 executing program 3: 06:19:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x4d, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:15 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x25, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x80a0000) 06:19:15 executing program 3: [ 3509.016611] Left network mode [ 3509.035039] IPVS: ftp: loaded support on port[0] = 21 06:19:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x4f, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:16 executing program 3: [ 3509.084944] IPVS: ftp: loaded support on port[0] = 21 [ 3509.096686] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3509.117545] Left network mode [ 3509.183883] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1a02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:16 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x100000001, 0x800000000000}) sigaltstack(&(0x7f0000000000/0x3000)=nil, 0x0) 06:19:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x54, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3509.432744] IPVS: ftp: loaded support on port[0] = 21 [ 3509.465657] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3509.550353] Started in network mode [ 3509.554244] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3509.576818] Enabling of bearer rejected, failed to enable media [ 3509.599302] IPVS: ftp: loaded support on port[0] = 21 [ 3509.851452] Enabling of bearer rejected, already enabled 06:19:16 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x74, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:16 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x100000001}) sigaltstack(&(0x7f0000000000/0x3000)=nil, 0x0) 06:19:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x55, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1c03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3510.057828] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3510.089959] IPVS: ftp: loaded support on port[0] = 21 [ 3510.339750] Enabling of bearer rejected, already enabled [ 3510.607347] IPVS: ftp: loaded support on port[0] = 21 06:19:18 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x47, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:18 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x80b0000) 06:19:18 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0xfffffffffffffffd, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000001c0)="9b247f9c1793", 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) read(r0, 0x0, 0x0) 06:19:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x57, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:18 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x7a, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:18 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={&(0x7f00000000c0)="595f4fe5c8db10a5b317fd0e8060da03d5611505a10270aa2048027d72ba0aa7f6bd66cbc577104c219f5291552f29fffb", 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000080)=0x1) write(r1, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) r2 = socket(0xa, 0x803, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x7ffff000}], 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 3511.264690] IPVS: ftp: loaded support on port[0] = 21 06:19:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x5c, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3511.288593] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3511.335806] IPVS: ftp: loaded support on port[0] = 21 06:19:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x5d, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3511.420391] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 06:19:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x5f, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3511.617574] IPVS: ftp: loaded support on port[0] = 21 [ 3511.689441] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3511.829755] Started in network mode [ 3511.833547] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3511.852318] Enabling of bearer rejected, failed to enable media [ 3511.884367] IPVS: ftp: loaded support on port[0] = 21 06:19:20 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x300, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) dup(0xffffffffffffffff) 06:19:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x61, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2401, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:20 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x80c0000) 06:19:20 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xf0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3513.330673] IPVS: ftp: loaded support on port[0] = 21 06:19:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 3513.356559] Left network mode 06:19:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x62, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3513.378570] IPVS: ftp: loaded support on port[0] = 21 [ 3513.396736] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3513.425681] Left network mode [ 3513.493640] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3513.511356] input: syz1 as /devices/virtual/input/input20 06:19:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x63, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2800, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3513.659675] IPVS: ftp: loaded support on port[0] = 21 [ 3513.715012] input: syz1 as /devices/virtual/input/input21 06:19:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x64, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3513.801442] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:20 executing program 3: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 3513.901356] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3513.901746] Started in network mode [ 3513.937657] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3513.964472] Enabling of bearer rejected, failed to enable media [ 3514.035953] IPVS: ftp: loaded support on port[0] = 21 06:19:22 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x3a7, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2a01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x65, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)=')--:\x00') 06:19:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xfc, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x80d0000) [ 3515.604674] IPVS: ftp: loaded support on port[0] = 21 [ 3515.617298] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x67, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) [ 3515.646723] IPVS: ftp: loaded support on port[0] = 21 [ 3515.745524] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x69, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8f2", 0x17}], 0x800, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x800) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffa) [ 3516.011195] IPVS: ftp: loaded support on port[0] = 21 [ 3516.020591] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x6a, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3516.100351] audit: type=1804 audit(1594880363.038:6454): pid=31094 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir488216525/syzkaller.8Zfrno/6320/bus" dev="sda1" ino=16900 res=1 [ 3516.159944] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3516.178427] audit: type=1804 audit(1594880363.118:6455): pid=31103 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir488216525/syzkaller.8Zfrno/6320/bus" dev="sda1" ino=16900 res=1 [ 3516.184856] Started in network mode [ 3516.263797] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3516.280597] Enabling of bearer rejected, failed to enable media [ 3516.330888] IPVS: ftp: loaded support on port[0] = 21 [ 3516.524894] Enabling of bearer rejected, already enabled [ 3517.506496] Left network mode 06:19:24 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x3, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) sendmmsg$alg(r1, &(0x7f0000002580)=[{0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000000200)="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", 0x159}, {0x0}, {&(0x7f0000001380)}, {0x0}], 0x4, 0x0, 0x0, 0x8000}], 0x1, 0x4805) 06:19:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x6b, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10020000) 06:19:24 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x300, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3517.866682] Left network mode [ 3517.892589] IPVS: ftp: loaded support on port[0] = 21 06:19:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x6c, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3517.951976] IPVS: ftp: loaded support on port[0] = 21 06:19:25 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {}, [{}, {}, {}, {}], {}, [{}, {}, {}]}, 0x5c, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000780)={0x0, 0xfb, 0x39, 0x0, 0x0, "61e04ac0f4cbf7c5d29eccf8fa819999", "c2a35bf6923c6b19a86a00a0cef97c17be8e8be7da3699d046384cda8973ad6ed8660798"}, 0x39, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000480), 0x24, 0x0) [ 3517.976268] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3518.003762] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3518.067330] Enabling of bearer rejected, already enabled 06:19:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x6d, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3518.108548] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2e02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:25 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000300)) 06:19:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x6f, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3518.397085] IPVS: ftp: loaded support on port[0] = 21 [ 3518.448127] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3518.464533] Started in network mode [ 3518.468604] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3518.504513] Enabling of bearer rejected, failed to enable media [ 3518.547556] IPVS: ftp: loaded support on port[0] = 21 06:19:27 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x47, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:27 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0xff) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 06:19:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3602, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x71, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:27 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10030000) 06:19:27 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x500, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x72, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3520.156040] IPVS: ftp: loaded support on port[0] = 21 [ 3520.162905] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3520.215514] IPVS: ftp: loaded support on port[0] = 21 [ 3520.222777] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 06:19:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) shutdown(0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000000)=""/203, 0xf9) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000c80), 0x4924924924924bd, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 3520.269608] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3520.276044] Enabling of bearer rejected, already enabled 06:19:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3c03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x73, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x74, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3520.573500] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3520.635297] IPVS: ftp: loaded support on port[0] = 21 06:19:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3520.821881] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3520.861754] Started in network mode [ 3520.865628] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3520.887588] Enabling of bearer rejected, failed to enable media [ 3520.913133] IPVS: ftp: loaded support on port[0] = 21 [ 3520.959217] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3520.985158] Enabling of bearer rejected, already enabled [ 3521.816416] Left network mode 06:19:29 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x58, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x75, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000002a80)=""/4098, 0x1002}], 0x1, 0x0) read$FUSE(r0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001a80), 0x1000) creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000080)='./file0/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) chown(&(0x7f00000002c0)='./file0/file0/file0/file0\x00', 0x0, 0x0) 06:19:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10040000) 06:19:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3522.790911] IPVS: ftp: loaded support on port[0] = 21 [ 3522.814064] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3522.834595] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3522.847183] Enabling of bearer rejected, already enabled [ 3522.988662] IPVS: ftp: loaded support on port[0] = 21 06:19:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x600, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x77, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4001, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:30 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x2, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x79, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3523.149429] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3523.178614] IPVS: ftp: loaded support on port[0] = 21 [ 3523.230805] IPVS: ftp: loaded support on port[0] = 21 [ 3523.244171] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3523.262865] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3523.267392] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 06:19:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x7a, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4a00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x7b, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10050000) [ 3523.524662] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3523.613035] IPVS: ftp: loaded support on port[0] = 21 [ 3523.619338] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, 0x0, 0x4088081) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) add_key$fscrypt_provisioning(&(0x7f0000000100)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x53, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 06:19:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x7c, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4a03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3523.785569] Started in network mode [ 3523.790021] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3523.807237] Enabling of bearer rejected, failed to enable media [ 3523.876926] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3523.906756] IPVS: ftp: loaded support on port[0] = 21 [ 3523.941606] Enabling of bearer rejected, already enabled [ 3525.936475] Left network mode 06:19:33 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x700, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x7d, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10060000) 06:19:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x5a02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:33 executing program 3: 06:19:33 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x3, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:33 executing program 3: 06:19:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3526.371406] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3526.400252] IPVS: ftp: loaded support on port[0] = 21 [ 3526.448081] IPVS: ftp: loaded support on port[0] = 21 [ 3526.467116] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 3526.478786] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:33 executing program 3: [ 3526.510956] Enabling of bearer rejected, already enabled 06:19:33 executing program 3: [ 3526.686722] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3526.794024] IPVS: ftp: loaded support on port[0] = 21 [ 3526.834661] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3526.867655] Started in network mode [ 3526.877243] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3526.896016] Enabling of bearer rejected, failed to enable media [ 3526.915945] IPVS: ftp: loaded support on port[0] = 21 06:19:34 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x900, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:34 executing program 3: 06:19:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6001, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:34 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10070000) [ 3527.518007] IPVS: ftp: loaded support on port[0] = 21 [ 3527.521795] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3527.882793] Started in network mode [ 3527.891973] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3527.913347] Enabling of bearer rejected, failed to enable media [ 3527.953414] IPVS: ftp: loaded support on port[0] = 21 [ 3528.002800] Enabling of bearer rejected, already enabled 06:19:35 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x5, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:35 executing program 3: 06:19:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x4, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6002, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xa00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:35 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10080000) 06:19:35 executing program 3: [ 3528.973789] IPVS: ftp: loaded support on port[0] = 21 06:19:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x5, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3529.018652] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3529.042031] IPVS: ftp: loaded support on port[0] = 21 [ 3529.047861] Enabling of bearer rejected, already enabled [ 3529.135790] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:36 executing program 3: 06:19:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6a01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:36 executing program 3: 06:19:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x6, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3529.429524] IPVS: ftp: loaded support on port[0] = 21 [ 3529.435197] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3529.526008] Left network mode [ 3529.529481] Started in network mode [ 3529.533176] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3529.540543] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3529.554987] Enabling of bearer rejected, failed to enable media [ 3529.565756] Left network mode [ 3529.578363] IPVS: ftp: loaded support on port[0] = 21 [ 3529.630183] Left network mode 06:19:37 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x6, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:37 executing program 3: 06:19:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x7, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6e02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xb00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x10090000) 06:19:38 executing program 3: [ 3531.099256] IPVS: ftp: loaded support on port[0] = 21 06:19:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0xa, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3531.130646] IPVS: ftp: loaded support on port[0] = 21 [ 3531.143449] Enabling of bearer rejected, already enabled 06:19:38 executing program 3: [ 3531.178254] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x98000, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000500)='\r', 0x1, 0x0, 0x0, 0x0) [ 3531.305188] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0xf, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3531.525250] IPVS: ftp: loaded support on port[0] = 21 [ 3531.535765] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 3531.593651] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3531.702840] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:38 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x7, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x0, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7001, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3531.815038] Started in network mode [ 3531.819008] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3531.875645] Enabling of bearer rejected, failed to enable media [ 3531.921810] IPVS: ftp: loaded support on port[0] = 21 06:19:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x100a0000) [ 3532.049077] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3532.053621] IPVS: ftp: loaded support on port[0] = 21 [ 3532.078314] Enabling of bearer rejected, already enabled [ 3532.154928] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3532.295257] IPVS: ftp: loaded support on port[0] = 21 06:19:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x2, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x98000, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)={0x28, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local}, @NL80211_ATTR_WIPHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x80) sendto$inet6(r0, &(0x7f0000000500)='\r', 0x1, 0x0, 0x0, 0x0) 06:19:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7202, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:39 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xf00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:39 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x12, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x3, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3532.540324] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3532.560391] IPVS: ftp: loaded support on port[0] = 21 [ 3532.592515] Enabling of bearer rejected, already enabled [ 3532.675637] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3532.687787] IPVS: ftp: loaded support on port[0] = 21 06:19:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x4, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7403, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x100b0000) 06:19:39 executing program 3: sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000000c0)=ANY=[], 0x20}}, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), 0xe) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000400)=[{0x0, 0x100000001, 0x1000}, {0x0, 0xfffe}], 0x2) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x9}], 0x1) 06:19:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x5, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3533.006528] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3533.022076] IPVS: ftp: loaded support on port[0] = 21 06:19:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0xa, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3533.083522] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7a01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:40 executing program 3: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 3533.170300] Started in network mode [ 3533.174174] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3533.206862] Enabling of bearer rejected, failed to enable media [ 3533.277341] IPVS: ftp: loaded support on port[0] = 21 06:19:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0xb, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3533.305418] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:40 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x1100, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3533.965551] IPVS: ftp: loaded support on port[0] = 21 [ 3534.142410] Started in network mode [ 3534.146172] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3534.156193] Enabling of bearer rejected, failed to enable media [ 3534.173767] IPVS: ftp: loaded support on port[0] = 21 06:19:42 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x47, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7c01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000204010002000270fff8f2", 0x17}], 0x200c010, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2e0c5, 0x0) write$9p(r1, &(0x7f0000001400)=';', 0x20001401) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x2100, &(0x7f0000000040)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x200a00}]) 06:19:42 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x100c0000) 06:19:42 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x2000, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3535.183481] IPVS: ftp: loaded support on port[0] = 21 [ 3535.191618] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3535.196642] Left network mode 06:19:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x2, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3535.256875] Left network mode [ 3535.275105] IPVS: ftp: loaded support on port[0] = 21 [ 3535.285715] Enabling of bearer rejected, already enabled [ 3535.323190] Left network mode [ 3535.343734] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7c03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3535.405781] Left network mode 06:19:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x3, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:42 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="e783"], 0x50) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 3535.560402] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x4, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3535.624442] Started in network mode [ 3535.628783] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3535.657051] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3535.657237] IPVS: ftp: loaded support on port[0] = 21 06:19:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x8003, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3535.675083] Enabling of bearer rejected, failed to enable media [ 3535.709286] IPVS: ftp: loaded support on port[0] = 21 [ 3535.780938] Enabling of bearer rejected, already enabled [ 3535.848310] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3535.931224] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:44 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x54, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x5, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x100d0000) 06:19:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x8203, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:44 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x0, 0x0) perf_event_open(0x0, 0x0, 0x8000002, r0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000000)) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 3537.996312] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3538.015250] IPVS: ftp: loaded support on port[0] = 21 [ 3538.033557] Enabling of bearer rejected, already enabled [ 3538.314773] IPVS: ftp: loaded support on port[0] = 21 06:19:45 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x21b1, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x8e01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x7, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) r1 = open(0x0, 0x0, 0x0) fchdir(r1) socket(0x11, 0x800000003, 0x0) socket(0x11, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:19:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x7, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3538.576235] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:45 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4700, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3538.659247] IPVS: ftp: loaded support on port[0] = 21 [ 3538.692186] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:45 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x13000000) 06:19:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x9402, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3538.874068] IPVS: ftp: loaded support on port[0] = 21 06:19:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0xa, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3538.894499] Enabling of bearer rejected, already enabled 06:19:45 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) open(0x0, 0x0, 0x0) 06:19:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0xf, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3539.097676] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x9803, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3539.167664] Started in network mode [ 3539.167701] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3539.167991] Enabling of bearer rejected, failed to enable media [ 3539.175250] IPVS: ftp: loaded support on port[0] = 21 [ 3539.187832] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3539.292887] IPVS: ftp: loaded support on port[0] = 21 [ 3539.347695] Enabling of bearer rejected, already enabled [ 3539.390467] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:46 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x3a00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x10, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x9a01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:46 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) open(0x0, 0x0, 0x0) 06:19:46 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x14000000) [ 3539.761046] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3539.831889] IPVS: ftp: loaded support on port[0] = 21 [ 3540.179768] Started in network mode [ 3540.183453] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3540.198547] Enabling of bearer rejected, failed to enable media [ 3540.225165] IPVS: ftp: loaded support on port[0] = 21 [ 3540.293262] Enabling of bearer rejected, already enabled 06:19:48 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x8, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x18, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x9e02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:48 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) open(0x0, 0x0, 0x0) 06:19:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x3f00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18020000) 06:19:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x2a, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3541.410147] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3541.452353] IPVS: ftp: loaded support on port[0] = 21 [ 3541.466621] Left network mode [ 3541.480769] IPVS: ftp: loaded support on port[0] = 21 06:19:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xa403, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3541.501450] Enabling of bearer rejected, already enabled 06:19:48 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) open(0x0, 0x0, 0x0) [ 3541.565565] Left network mode [ 3541.605462] Left network mode 06:19:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x3c, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3541.670172] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x48, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3541.750448] IPVS: ftp: loaded support on port[0] = 21 [ 3541.785785] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:48 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3541.957674] Started in network mode [ 3541.961423] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3541.971278] Enabling of bearer rejected, failed to enable media [ 3541.984649] IPVS: ftp: loaded support on port[0] = 21 [ 3542.158140] Enabling of bearer rejected, already enabled 06:19:50 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0xa, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xa602, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x4c, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:50 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:50 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x4000, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:50 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18030000) 06:19:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x61, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:50 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3543.881793] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3543.888730] IPVS: ftp: loaded support on port[0] = 21 [ 3543.903501] Enabling of bearer rejected, already enabled [ 3543.907800] IPVS: ftp: loaded support on port[0] = 21 06:19:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xac02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3544.072551] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:51 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x63, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xae02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3544.263351] IPVS: ftp: loaded support on port[0] = 21 [ 3544.284635] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3544.403235] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3544.461152] Started in network mode [ 3544.465051] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3544.474414] Enabling of bearer rejected, failed to enable media [ 3544.509470] IPVS: ftp: loaded support on port[0] = 21 [ 3545.666521] Left network mode 06:19:52 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x25, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x68, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:52 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) 06:19:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xb400, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:52 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18040000) 06:19:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x4800, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3545.996839] Left network mode [ 3546.001038] IPVS: ftp: loaded support on port[0] = 21 [ 3546.019729] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x69, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3546.045565] IPVS: ftp: loaded support on port[0] = 21 06:19:53 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) [ 3546.074068] Enabling of bearer rejected, already enabled 06:19:53 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) 06:19:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6c, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3546.178108] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xb601, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:53 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3546.353115] IPVS: ftp: loaded support on port[0] = 21 [ 3546.460247] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3546.500111] Started in network mode [ 3546.503804] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3546.512289] Enabling of bearer rejected, failed to enable media [ 3546.546738] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3546.549916] IPVS: ftp: loaded support on port[0] = 21 [ 3546.801245] Enabling of bearer rejected, already enabled 06:19:55 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x47, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x71, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:55 executing program 3: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xba00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:55 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18050000) 06:19:55 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x4c00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3548.562064] IPVS: ftp: loaded support on port[0] = 21 [ 3548.620285] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3548.652472] IPVS: ftp: loaded support on port[0] = 21 [ 3548.667091] Enabling of bearer rejected, already enabled 06:19:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x73, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xc402, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x74, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3548.885206] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:55 executing program 3: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3548.941627] IPVS: ftp: loaded support on port[0] = 21 06:19:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xc802, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3549.121880] Started in network mode [ 3549.125696] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3549.137049] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3549.145708] Enabling of bearer rejected, failed to enable media [ 3549.183425] IPVS: ftp: loaded support on port[0] = 21 06:19:56 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x60, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:56 executing program 3: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x79, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3549.242595] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3549.271798] Enabling of bearer rejected, already enabled 06:19:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xcc03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:56 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18060000) [ 3549.425737] Enabling of bearer rejected, already enabled [ 3549.446353] IPVS: ftp: loaded support on port[0] = 21 [ 3549.513866] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3549.600751] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3549.705451] IPVS: ftp: loaded support on port[0] = 21 06:19:57 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x6000, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:57 executing program 3: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x7a, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:19:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xd601, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:57 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:57 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18070000) 06:19:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3550.857653] IPVS: ftp: loaded support on port[0] = 21 06:19:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x26f, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3550.878419] Enabling of bearer rejected, already enabled [ 3550.885077] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3550.903879] IPVS: ftp: loaded support on port[0] = 21 [ 3550.911654] Left network mode 06:19:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xda00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x300, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3551.089548] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:19:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x500, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3551.191093] IPVS: ftp: loaded support on port[0] = 21 [ 3551.212866] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3551.301795] Started in network mode [ 3551.305602] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3551.314496] Enabling of bearer rejected, failed to enable media [ 3551.342143] IPVS: ftp: loaded support on port[0] = 21 [ 3551.533017] Enabling of bearer rejected, already enabled 06:19:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x6800, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:19:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:19:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xda01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:19:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x600, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3551.667654] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3551.700141] IPVS: ftp: loaded support on port[0] = 21 [ 3551.771398] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3551.931131] Started in network mode [ 3551.934838] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3551.945132] Enabling of bearer rejected, failed to enable media [ 3551.963737] IPVS: ftp: loaded support on port[0] = 21 06:20:00 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x4, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18080000) 06:20:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x700, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xde00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:00 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x6c00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3553.322952] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xe602, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3553.392029] IPVS: ftp: loaded support on port[0] = 21 [ 3553.433684] IPVS: ftp: loaded support on port[0] = 21 06:20:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0xa00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3553.461119] Enabling of bearer rejected, already enabled [ 3553.550610] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0xf00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3553.690496] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xec00, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3553.822561] IPVS: ftp: loaded support on port[0] = 21 [ 3553.934250] Started in network mode [ 3553.938283] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3553.953857] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3553.964134] Enabling of bearer rejected, failed to enable media [ 3553.995707] IPVS: ftp: loaded support on port[0] = 21 06:20:01 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x8, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3554.057101] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3554.090740] Enabling of bearer rejected, already enabled 06:20:01 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x18090000) 06:20:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x1018, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3554.180792] IPVS: ftp: loaded support on port[0] = 21 [ 3554.189242] Enabling of bearer rejected, already enabled 06:20:01 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x7400, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3554.312569] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x1800, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3554.395592] IPVS: ftp: loaded support on port[0] = 21 [ 3554.426956] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xee02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x1810, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3554.553688] IPVS: ftp: loaded support on port[0] = 21 [ 3554.634640] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x2000, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3554.732303] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3554.864433] Started in network mode [ 3554.868344] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3554.897914] Enabling of bearer rejected, failed to enable media [ 3554.941998] IPVS: ftp: loaded support on port[0] = 21 [ 3555.836511] Left network mode [ 3556.116531] Left network mode 06:20:03 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0xa, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xf600, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x2a00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:03 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x180a0000) 06:20:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x7a00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x3c00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3556.246121] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3556.258042] IPVS: ftp: loaded support on port[0] = 21 [ 3556.286048] IPVS: ftp: loaded support on port[0] = 21 06:20:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xf803, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3556.346336] Left network mode [ 3556.364202] Enabling of bearer rejected, already enabled [ 3556.413545] Left network mode [ 3556.455557] Left network mode 06:20:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x3f00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x50, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3556.564457] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xfa02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3556.664064] IPVS: ftp: loaded support on port[0] = 21 [ 3556.689855] Started in network mode [ 3556.693878] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3556.707297] Enabling of bearer rejected, failed to enable media [ 3556.722876] IPVS: ftp: loaded support on port[0] = 21 [ 3556.743551] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:05 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x15, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x4000, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xfa03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x80fe, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x180b0000) 06:20:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x4800, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3558.895782] IPVS: ftp: loaded support on port[0] = 21 [ 3558.904785] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xfc02, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3558.946190] IPVS: ftp: loaded support on port[0] = 21 [ 3558.955307] Enabling of bearer rejected, already enabled 06:20:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x4c00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3559.110306] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6100, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3559.221910] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3559.350507] IPVS: ftp: loaded support on port[0] = 21 [ 3559.418060] Started in network mode [ 3559.421928] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3559.431023] Enabling of bearer rejected, failed to enable media [ 3559.472918] IPVS: ftp: loaded support on port[0] = 21 [ 3560.846587] Left network mode 06:20:08 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x25, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xfc03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6300, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:08 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x180c0000) 06:20:08 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xb121, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3561.115378] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6800, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3561.157886] IPVS: ftp: loaded support on port[0] = 21 06:20:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 3561.190436] IPVS: ftp: loaded support on port[0] = 21 [ 3561.204222] Left network mode [ 3561.228588] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3561.258225] Enabling of bearer rejected, already enabled 06:20:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xfe01, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6900, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50}, @ramp}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 06:20:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6c00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3561.460904] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3561.520323] Started in network mode [ 3561.524087] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3561.536248] Enabling of bearer rejected, failed to enable media [ 3561.564840] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3561.571339] IPVS: ftp: loaded support on port[0] = 21 [ 3561.608880] IPVS: ftp: loaded support on port[0] = 21 06:20:10 executing program 3: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) 06:20:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x6f02, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xfe03, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:10 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x180d0000) 06:20:10 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x47, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:10 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xc0fe, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3563.150586] IPVS: ftp: loaded support on port[0] = 21 [ 3563.161811] IPVS: ftp: loaded support on port[0] = 21 06:20:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x7100, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:10 executing program 3: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) [ 3563.206720] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3563.239029] Enabling of bearer rejected, already enabled 06:20:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x7300, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:10 executing program 3: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) [ 3563.490671] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3563.505066] IPVS: ftp: loaded support on port[0] = 21 06:20:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x7400, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3563.574897] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, 0x0, 0x0) 06:20:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x7900, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3563.768765] Started in network mode [ 3563.772634] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3563.798885] Enabling of bearer rejected, failed to enable media [ 3563.856148] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3563.868811] IPVS: ftp: loaded support on port[0] = 21 06:20:10 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20020000) 06:20:10 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x300, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3564.044495] IPVS: ftp: loaded support on port[0] = 21 [ 3564.095143] Enabling of bearer rejected, already enabled [ 3564.207971] IPVS: ftp: loaded support on port[0] = 21 06:20:11 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xf000, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, 0x0, 0x0) 06:20:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x7a00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:11 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x3a7, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3564.405645] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3564.418598] IPVS: ftp: loaded support on port[0] = 21 [ 3564.419895] IPVS: ftp: loaded support on port[0] = 21 06:20:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0xff00, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3564.448373] Enabling of bearer rejected, already enabled 06:20:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x50, 0x2}, @ramp}) write$evdev(r0, 0x0, 0x0) 06:20:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3564.678282] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') ioctl$DRM_IOCTL_MODE_CURSOR2(0xffffffffffffffff, 0xc02464bb, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xd15}) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 3564.782416] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3564.854428] IPVS: ftp: loaded support on port[0] = 21 06:20:11 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20030000) 06:20:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x989680, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3565.055018] Started in network mode [ 3565.060179] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3565.083367] Enabling of bearer rejected, failed to enable media [ 3565.090905] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3565.140524] IPVS: ftp: loaded support on port[0] = 21 [ 3565.172893] Enabling of bearer rejected, already enabled [ 3565.836921] Left network mode [ 3566.546492] Left network mode 06:20:13 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xfc00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:13 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x3, 0x12, &(0x7f0000000280)=""/246) 06:20:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:13 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20040000) 06:20:13 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0x25, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3567.022726] IPVS: ftp: loaded support on port[0] = 21 06:20:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x3}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3567.049261] IPVS: ftp: loaded support on port[0] = 21 [ 3567.066735] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3567.073963] Enabling of bearer rejected, already enabled 06:20:14 executing program 3: sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000000c0)=ANY=[], 0x20}}, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), 0xe) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/stat\x00', 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 06:20:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x4}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3567.344590] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3567.430977] IPVS: ftp: loaded support on port[0] = 21 06:20:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2020000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x5}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3567.597087] Started in network mode [ 3567.601283] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3567.615644] Enabling of bearer rejected, failed to enable media [ 3567.650145] IPVS: ftp: loaded support on port[0] = 21 [ 3567.755591] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3567.857904] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xfe80, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:15 executing program 3: 06:20:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x6}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20050000) 06:20:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3568.250375] IPVS: ftp: loaded support on port[0] = 21 [ 3568.291578] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3568.634541] Started in network mode [ 3568.641817] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3568.659743] Enabling of bearer rejected, failed to enable media [ 3568.689104] IPVS: ftp: loaded support on port[0] = 21 06:20:16 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0x47, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:16 executing program 3: 06:20:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x7}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20060000) 06:20:16 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xfec0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:16 executing program 3: [ 3569.738909] IPVS: ftp: loaded support on port[0] = 21 06:20:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0xa}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3569.783438] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3569.795409] IPVS: ftp: loaded support on port[0] = 21 [ 3569.808188] Enabling of bearer rejected, already enabled 06:20:16 executing program 3: 06:20:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4010000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x4000) ioctl$TCSETSF(0xffffffffffffffff, 0x5453, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 06:20:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0xf}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3570.043748] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3570.137014] IPVS: ftp: loaded support on port[0] = 21 06:20:17 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xbb5, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006100)=[{{&(0x7f00000001c0)=@ethernet={0x0, @dev}, 0x80, 0x0}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 06:20:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x10}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3570.322928] Started in network mode [ 3570.327885] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3570.365093] Enabling of bearer rejected, failed to enable media [ 3570.390573] IPVS: ftp: loaded support on port[0] = 21 [ 3570.412557] IPVS: ftp: loaded support on port[0] = 21 [ 3570.444813] Enabling of bearer rejected, already enabled [ 3570.510993] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3570.522645] Enabling of bearer rejected, already enabled 06:20:17 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20070000) [ 3570.854854] IPVS: ftp: loaded support on port[0] = 21 06:20:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xff00, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x18}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:19 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:19 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20080000) 06:20:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006100)=[{{&(0x7f00000001c0)=@ethernet={0x0, @dev}, 0x80, 0x0}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 3572.316132] IPVS: ftp: loaded support on port[0] = 21 [ 3572.323591] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3572.357877] Enabling of bearer rejected, already enabled [ 3572.388395] IPVS: ftp: loaded support on port[0] = 21 [ 3572.397590] Left network mode [ 3572.428102] Left network mode 06:20:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x2a}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3572.522795] Left network mode [ 3572.579658] IPVS: ftp: loaded support on port[0] = 21 06:20:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x3c}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3572.678724] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3572.833533] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x8020000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x48}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3573.063766] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 3573.187570] Started in network mode [ 3573.191476] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3573.200465] Enabling of bearer rejected, failed to enable media [ 3573.237276] IPVS: ftp: loaded support on port[0] = 21 06:20:20 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0xffff, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x4c}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006100)=[{{&(0x7f00000001c0)=@ethernet={0x0, @dev}, 0x80, 0x0}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 3573.809771] IPVS: ftp: loaded support on port[0] = 21 [ 3574.296646] Started in network mode [ 3574.300657] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3574.317607] Enabling of bearer rejected, failed to enable media [ 3574.341669] IPVS: ftp: loaded support on port[0] = 21 06:20:22 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x2, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x20090000) 06:20:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x61}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:22 executing program 3: 06:20:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:22 executing program 3: [ 3575.152337] IPVS: ftp: loaded support on port[0] = 21 06:20:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x63}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3575.177301] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3575.189143] IPVS: ftp: loaded support on port[0] = 21 [ 3575.204755] Enabling of bearer rejected, already enabled 06:20:22 executing program 3: 06:20:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x68}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:22 executing program 3: [ 3575.490952] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3575.522399] IPVS: ftp: loaded support on port[0] = 21 06:20:22 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x3, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3575.732538] Started in network mode [ 3575.738619] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3575.752519] Enabling of bearer rejected, failed to enable media [ 3575.777822] IPVS: ftp: loaded support on port[0] = 21 [ 3575.842844] Enabling of bearer rejected, already enabled [ 3575.849923] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3575.861566] IPVS: ftp: loaded support on port[0] = 21 [ 3575.910436] Enabling of bearer rejected, already enabled 06:20:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x200a0000) 06:20:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x69}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:22 executing program 3: [ 3576.160876] IPVS: ftp: loaded support on port[0] = 21 06:20:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x2, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1a020000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:25 executing program 3: 06:20:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x6c}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x200b0000) [ 3578.293071] Left network mode 06:20:25 executing program 3: 06:20:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x71}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3578.342034] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3578.379531] IPVS: ftp: loaded support on port[0] = 21 [ 3578.521047] Left network mode [ 3578.561754] Left network mode [ 3578.612368] Left network mode [ 3578.632826] Enabling of bearer rejected, already enabled [ 3578.659598] IPVS: ftp: loaded support on port[0] = 21 06:20:25 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:25 executing program 3: 06:20:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x73}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1c030000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3578.730374] Started in network mode [ 3578.734455] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3578.744175] Enabling of bearer rejected, failed to enable media [ 3578.835918] IPVS: ftp: loaded support on port[0] = 21 [ 3578.845835] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:25 executing program 3: 06:20:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x74}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x3, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3578.881746] Enabling of bearer rejected, already enabled 06:20:25 executing program 3: 06:20:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3579.009898] IPVS: ftp: loaded support on port[0] = 21 06:20:26 executing program 3: 06:20:26 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x200c0000) 06:20:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x79}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3579.230030] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3579.264805] IPVS: ftp: loaded support on port[0] = 21 [ 3579.347593] Enabling of bearer rejected, already enabled [ 3579.515882] IPVS: ftp: loaded support on port[0] = 21 [ 3579.910280] Enabling of bearer rejected, already enabled 06:20:28 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x5, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:28 executing program 3: 06:20:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x7a}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:28 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x200d0000) 06:20:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x4, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) [ 3581.159768] IPVS: ftp: loaded support on port[0] = 21 06:20:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3581.205199] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3581.254772] Enabling of bearer rejected, already enabled [ 3581.258761] IPVS: ftp: loaded support on port[0] = 21 06:20:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x24010000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:28 executing program 3: r0 = socket$inet(0xa, 0x2, 0x73) bind(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r1 = socket$inet(0xa, 0x2, 0x73) bind(r1, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) 06:20:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005680)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="280000001300010000000000000000000700000001000000080000800400000008001a0036"], 0x28}], 0x1}, 0x0) [ 3581.549446] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3581.685861] Started in network mode [ 3581.692201] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3581.700680] IPVS: ftp: loaded support on port[0] = 21 [ 3581.722063] Enabling of bearer rejected, failed to enable media [ 3581.748583] IPVS: ftp: loaded support on port[0] = 21 [ 3583.266543] Left network mode 06:20:30 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x6, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x3}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:30 executing program 3: r0 = socket$inet(0xa, 0x2, 0x73) bind(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) connect(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80) 06:20:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x28000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x28020000) 06:20:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x5, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000340)={0x30, 0x20, 0x8b73102c764253c5, 0x0, 0x0, "", [@nested={0x5, 0x0, 0x0, 0x1, [@typed={0xc, 0xe, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0x30}], 0x1}, 0x0) 06:20:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x4}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3583.488614] IPVS: ftp: loaded support on port[0] = 21 [ 3583.496332] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2a010000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3583.581996] IPVS: ftp: loaded support on port[0] = 21 [ 3583.592194] Enabling of bearer rejected, already enabled [ 3583.603472] Left network mode 06:20:30 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x5}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3583.747553] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3583.791919] IPVS: ftp: loaded support on port[0] = 21 06:20:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3583.917221] IPVS: ftp: loaded support on port[0] = 21 [ 3584.016916] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3584.099735] Started in network mode [ 3584.103593] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3584.123710] Enabling of bearer rejected, failed to enable media [ 3584.196676] IPVS: ftp: loaded support on port[0] = 21 [ 3584.303327] Enabling of bearer rejected, already enabled [ 3584.324686] Enabling of bearer rejected, already enabled 06:20:32 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x7, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x6}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x28030000) 06:20:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2c020000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x4}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:32 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x6, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:32 executing program 3: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x8, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x7}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3586.004128] IPVS: ftp: loaded support on port[0] = 21 [ 3586.009954] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3586.019546] IPVS: ftp: loaded support on port[0] = 21 [ 3586.064159] Enabling of bearer rejected, already enabled 06:20:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2e020000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3586.172918] IPVS: ftp: loaded support on port[0] = 21 06:20:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0xa}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3586.257657] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x36020000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3586.444521] IPVS: ftp: loaded support on port[0] = 21 06:20:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0xf}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3586.571769] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3586.706331] Started in network mode [ 3586.712514] Own node identity 00000000000000000000ffffac1e0005, cluster identity 4711 [ 3586.726005] Enabling of bearer rejected, failed to enable media [ 3586.750402] IPVS: ftp: loaded support on port[0] = 21 [ 3587.956559] Left network mode 06:20:35 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x8, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x10}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3c030000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:35 executing program 3: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x4, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:35 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x28040000) 06:20:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x18}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3588.206571] IPVS: ftp: loaded support on port[0] = 21 [ 3588.212029] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3588.246682] IPVS: ftp: loaded support on port[0] = 21 06:20:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3588.250696] Enabling of bearer rejected, already enabled [ 3588.254418] IPVS: ftp: loaded support on port[0] = 21 [ 3588.295689] Left network mode 06:20:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x2a}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3588.540952] IPVS: ftp: loaded support on port[0] = 21 06:20:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x3c}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3588.574737] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 06:20:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3588.743268] Enabling of bearer rejected, already enabled 06:20:35 executing program 3: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x0, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 3588.815768] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3588.820512] IPVS: ftp: loaded support on port[0] = 21 [ 3588.896821] Enabling of bearer rejected, already enabled [ 3588.969766] IPVS: ftp: loaded support on port[0] = 21 [ 3589.030182] Enabling of bearer rejected, already enabled 06:20:37 executing program 1: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x9, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x48}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x40010000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x28050000) 06:20:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3590.763050] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3590.768731] IPVS: ftp: loaded support on port[0] = 21 [ 3590.793695] Enabling of bearer rejected, already enabled [ 3590.968275] IPVS: ftp: loaded support on port[0] = 21 06:20:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x8, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:38 executing program 3: unshare(0x40000000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x4, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0x60], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 06:20:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x4c}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) 06:20:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4a000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) 06:20:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x61}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) [ 3591.187368] kasan: CONFIG_KASAN_INLINE enabled [ 3591.202280] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 3591.222074] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3591.226549] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 3591.233600] IPVS: ftp: loaded support on port[0] = 21 [ 3591.237305] CPU: 1 PID: 3816 Comm: syz-executor.1 Not tainted 4.19.132-syzkaller #0 [ 3591.237312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3591.237332] RIP: 0010:free_netdev+0x41/0x410 [ 3591.237349] Code: d2 be 0a 24 00 00 48 c7 c7 80 85 2a 88 e8 57 3a 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 70 d8 fb [ 3591.255748] IPVS: ftp: loaded support on port[0] = 21 [ 3591.259675] RSP: 0018:ffff888091f0fc28 EFLAGS: 00010202 [ 3591.259686] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 3591.259695] RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400 [ 3591.259702] RBP: ffff88808e4256c0 R08: 0000000000000001 R09: 0000000000000000 [ 3591.259710] R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4 [ 3591.259717] R13: ffff88808e425ad0 R14: ffff88809188e4c0 R15: ffff888013612cc8 [ 3591.259727] FS: 00007f894b8ae700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 3591.259735] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3591.259748] CR2: 00007fa7ec01cc18 CR3: 0000000042e6c000 CR4: 00000000001406e0 [ 3591.351392] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3591.359104] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3591.366371] Call Trace: [ 3591.368970] ip6gre_init_net+0x54b/0x620 [ 3591.373033] ? ip6gre_dellink+0x2d0/0x2d0 [ 3591.377183] ops_init+0xb3/0x410 [ 3591.380572] setup_net+0x2c2/0x720 [ 3591.384108] ? rtnl_net_dumpid_one+0x250/0x250 [ 3591.388690] copy_net_ns+0x1f7/0x335 [ 3591.392401] create_new_namespaces+0x3f6/0x7b0 [ 3591.397004] unshare_nsproxy_namespaces+0xbd/0x1f0 [ 3591.401931] ksys_unshare+0x36c/0x9a0 [ 3591.405725] ? walk_process_tree+0x2c0/0x2c0 [ 3591.415179] ? __se_sys_clock_gettime+0x124/0x1e0 [ 3591.420046] ? posix_timer_fn+0x3d0/0x3d0 [ 3591.424191] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3591.428961] ? trace_hardirqs_off_caller+0x69/0x210 [ 3591.433973] __x64_sys_unshare+0x2d/0x40 [ 3591.438033] do_syscall_64+0xf9/0x620 [ 3591.441847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3591.447030] RIP: 0033:0x45cba9 [ 3591.450219] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3591.469113] RSP: 002b:00007f894b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 3591.476817] RAX: ffffffffffffffda RBX: 000000000050d7e0 RCX: 000000000045cba9 06:20:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4a030000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@grpjquota='grpjquota', 0x3d}], [{@seclabel='seclabel'}]}) [ 3591.484095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 3591.491358] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3591.498712] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 3591.505981] R13: 0000000000000cdb R14: 00000000004cf241 R15: 00007f894b8ae6d4 [ 3591.513255] Modules linked in: 06:20:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c, 0x241}) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000f40)=ANY=[@ANYBLOB="04"], 0xd04}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x28060000) [ 3591.700210] ---[ end trace 95e0f05822f060f0 ]--- [ 3591.710164] RIP: 0010:free_netdev+0x41/0x410 [ 3591.714752] Code: d2 be 0a 24 00 00 48 c7 c7 80 85 2a 88 e8 57 3a 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 70 d8 fb [ 3591.727955] IPVS: ftp: loaded support on port[0] = 21 [ 3591.773961] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3591.805268] RSP: 0018:ffff888091f0fc28 EFLAGS: 00010202 [ 3591.833447] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 3591.839134] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 3591.880404] RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400 [ 3591.911151] RBP: ffff88808e4256c0 R08: 0000000000000001 R09: 0000000000000000 [ 3591.935790] R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4 [ 3591.960003] R13: ffff88808e425ad0 R14: ffff88809188e4c0 R15: ffff888013612cc8 [ 3591.979500] FS: 00007f894b8ae700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 3591.988602] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3591.994708] CR2: 0000564b0c9b4920 CR3: 0000000042e6c000 CR4: 00000000001406f0 [ 3592.006885] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3592.014815] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3592.025787] Kernel panic - not syncing: Fatal exception [ 3592.032314] Kernel Offset: disabled [ 3592.035930] Rebooting in 86400 seconds..