200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1092.267541] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:57:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xcea70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:53 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000400), 0x0, 0x10d882) memfd_create(&(0x7f0000000440)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9l^i\xda\x1cxo-\x89I\xd3\x04$\x7f\xbe[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11', 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socket(0x10, 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x64, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x3c, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8}, {0x8, 0x1a}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x64}}, 0x0) r2 = creat(0x0, 0x3) write$binfmt_script(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c653020cdd9b352b4a0f76f65e06efdaab05fc7bc450ea977001e511ceac27c7105f8e29e23e58c507b87423a7b18791a9e110b961d6df0bd8999"], 0x191) openat$incfs(r2, &(0x7f0000000000)='.log\x00', 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000640)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)}]) 10:57:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1092.292550] cramfs: empty filesystem [ 1092.364841] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.364841] 10:57:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x64a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:54 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000008000000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1092.593922] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1092.701081] cramfs: empty filesystem [ 1092.919837] IPVS: ftp: loaded support on port[0] = 21 10:57:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x65580000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xcfa70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xcea70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:57:54 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000009000000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:54 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r1, 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x0) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r3, 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x5118, 0x700}, {r1, 0x80}, {r0, 0x2400}, {r2, 0x1010}, {r3, 0x60a0}], 0x5, 0x0, &(0x7f00000000c0)={[0x7]}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1093.229510] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.229510] [ 1093.245134] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:57:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x65a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:57:54 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000010000000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:54 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x9, 0x4, 0x7, 0x86, 0x0, 0x3ff, 0x814, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x75, 0x2, @perf_config_ext={0x5, 0x4}, 0x42000, 0x100000000, 0xff, 0x3, 0x80000001, 0x8, 0xff, 0x0, 0x3f, 0x0, 0x3f}, r1, 0x5, r0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x4c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:57:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd0a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1093.301512] cramfs: empty filesystem [ 1093.420364] IPVS: ftp: loaded support on port[0] = 21 [ 1093.495807] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.495807] [ 1093.529335] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:57:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x66a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd1a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1093.617173] cramfs: empty filesystem [ 1093.617557] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.617557] 10:57:55 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000018000000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1093.667577] IPVS: ftp: loaded support on port[0] = 21 10:57:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:57:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x67a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd2a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1093.977463] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1094.014814] cramfs: empty filesystem [ 1094.175863] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.175863] [ 1094.223644] IPVS: ftp: loaded support on port[0] = 21 [ 1094.272215] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.272215] 10:57:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd3a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:56 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000023000000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x68000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:57:56 executing program 1: r0 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x6a, 0xfffffffffffffffe) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000180)={0x0, 0x6, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00\n3\x00'}}) r1 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r3 = add_key(&(0x7f0000000280)='logon\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000001480)="6674da3cd73ad0386aa5199fd3eb93b2efc5bde2b27de8fe791d9e836b45bc3965e472d903cac5e6acc9b2ac191ca794ed05654281216742075d7975eebe75846325a3d5aa12119c894545cdaabfb4f0bd12e12c7eef4a9f", 0x58, r2) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r4, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400)={r1, r1, r3}, &(0x7f0000001500)=""/141, 0x8d, &(0x7f0000001640)={&(0x7f00000015c0)={'sha512-arm\x00'}, &(0x7f0000001600)="aaa41845fe83e2110c5cc96cda4afdedab47fe1d25908c6e46ad787ce9a8bc8f7df40112778f4a4417833b7c094d", 0x2e}) keyctl$clear(0x7, r2) request_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000340)='\x00', r2) add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000480)="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", 0x1000, r2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 10:57:56 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, 0x0, 0x4800) clone(0x80000, &(0x7f00000003c0)="96579b196646306e6f512067f52906bc4f3028a1709d4f18a22fdc3dba9d0825bef85b842107491a962429fbffdcec680d613656046ad5639438daf68f5320e999f894aea4e0f900fba50a70f56149e1d885237da2e4b6a6ea1030250dbfce9a1a0715dceb7a37d20c47a8bdcdb01a59cffce4ba77", &(0x7f0000000300), &(0x7f0000000440), &(0x7f0000000480)="6afd0d5f47c4ccf9ffc038") unshare(0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x0, 0x81, 0x81, 0x0, 0x9, 0x11040, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x9, 0x6}, 0x1, 0x200, 0x1, 0x9, 0x5, 0xc4, 0x8, 0x0, 0x8001, 0x0, 0x10000}, 0xffffffffffffffff, 0x4, r0, 0x8) r1 = open(0x0, 0x141042, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c653020cdd9b352b4a0f76f65e06efdaab05fc7bc450ea977001e511ceac27c7105f8e29e23e58c507b87423a7b18791a9e110b961d6df0bd8999"], 0x191) ppoll(&(0x7f0000000240)=[{r0, 0x8004}], 0x1, &(0x7f0000000280), &(0x7f00000002c0), 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, 0xfffffffffffffffc) creat(&(0x7f00000004c0)='./file0\x00', 0xe5) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0xc700, 0x20) mremap(&(0x7f0000816000/0x3000)=nil, 0x3000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) [ 1095.166871] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1095.196889] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.196889] 10:57:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x68a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:56 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000060000000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2f, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:57:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd4a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1095.218451] cramfs: empty filesystem [ 1095.356002] IPVS: ftp: loaded support on port[0] = 21 [ 1095.415272] could not allocate digest TFM handle sha512-arm [ 1095.533197] could not allocate digest TFM handle sha512-arm [ 1095.579603] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1095.603849] cramfs: empty filesystem [ 1095.624417] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.624417] 10:57:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x69a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:57 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000600)=ANY=[@ANYBLOB="833695d1b54dffffffffffff0800001c0004007e7e02907800000000e0000001110290780000000000002ca604"], 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a8, 0x2c0, 0x9403, 0x0, 0x2c0, 0x2c0, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x508) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2c8, 0x3, 0x390, 0x208, 0x229, 0x240, 0x0, 0x0, 0x2f8, 0x328, 0x328, 0x2f8, 0x328, 0x3, 0x0, {[{{@ip={@broadcast, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'bridge0\x00'}, 0x0, 0x1e8, 0x208, 0x0, {0x0, 0x700}, [@common=@inet=@hashlimit2={{0x150}, {'veth1_to_team\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xffff, 0x0, 0x48}}}, @common=@inet=@ecn={{0x28}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x1c) syz_mount_image$fuse(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize}, {}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1c00}}], [{@dont_hash}, {@appraise_type}, {@seclabel}, {@obj_role={'obj_role', 0x3d, '--\x8d\xad{'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000005c0)='veno\x00', 0x5) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000680)={@private1, 0x52f, 0x0, 0xff, 0xa, 0x3, 0x7a}, &(0x7f00000006c0)=0x20) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffb) syz_emit_ethernet(0x6a, &(0x7f0000000800)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x34, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xd, 0xc2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}, @exp_fastopen={0xfe, 0xf, 0xf989, "8f5a000000000000000000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 10:57:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd5a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:57 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000030000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0x3, 0xffffffffffffffee) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}, 0x80000002}, 0x1c) sendmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000240)="75ea8b50ddbf4338f94335e4b04bb0b3b2e6b1ce21765048c01bb12d6b4dd6fb6ad5994ac3c7970ed4b015b4efb7d1fa242ecbc97db27ed371815cf40eff3b0a0df66bda61944bf3a7e854a3aa5fdbe112404d8a05d7fda1051aef2fc0b21489d3839e1fae264738e52365564cc4a43ec89dd4936cdcd16685504e9092912a1a061a5a7bb37d270d5ed42602c5d6c03e2c10f41b290360bf6039217d629c2b825e9f4edeb95feb6c538ad7622d71701691d944dc06530f0b7147b27f6cea882f0306cd810e2ea303e92b97fbd05735b4de60713856bb8f7e2b8e6b7871", 0xdd}, {&(0x7f00000003c0)="b411dc9199005ea9a32b32f286b3b8085585dc3255f1f21592392e8c671c870f1e35495e25512ebf04dea14b047b497f5eba5069735618a696a9e6ad7cb23147a7c90802a8abee7363f7a9287c8b2d4367e21e08bd0f1695a8", 0x59}, {&(0x7f0000000340)="d1655a8848f276d8253224deac0ac0a75b1afefd4101e4cdd83323d3772d5fd41a2bdc96f548c802783b3eb385e0c512efddd53378117de6", 0x38}, {&(0x7f0000000440)="2e735f2d36764258ca6e296e57f875101b39243c02ec91aa60c1880c5f91cb83c6b6804502510aff1c561a9bb945d618d66e20ffc6a512402b8a3dd6b8999e7e0de7a9af2afe887f22d006e7f9367c78a84a8bce8075f9b3260486d066a41aff15328268", 0x64}, {&(0x7f00000004c0)="f9faa14ce113cf53c807c0b3e4144cd21e690288528dde27d323982707e3445c6c", 0x21}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) close(0xffffffffffffffff) r3 = dup2(r2, r0) setsockopt$inet6_int(r3, 0x29, 0x4, &(0x7f0000000580), 0x4) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup2(0xffffffffffffffff, r5) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000600)={{r6, r7+60000000}, {0x77359400}}, &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b04, &(0x7f0000000000)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x04\x00\a\x00\x00\x00\x01\x00\x00\x00\x00,C\xfdB\x00\x00\x00\x00\x00\x00\x00l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\b\xde\xbbg\xc18\x84,:f\xcb\xe8oOA\x8eYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c,\xe8\xff^9P\xee\x8aG\xdd\x00\x0e\xd8\x06\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW\xdc\xcf\xe9\x8d\xe8\xcf\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\x8a\xe3\x9c\x96\xf5\xf8\xb5\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v\xb3\xb1\x05\xa05\xdc\x12\x86\xb9\xf93\xac\x14\x1fXf\xfd\xde0\x83\xd9\xcc\xce]\xa5\x11V\x06$\xb3\xae\b8\xa5R\xa1\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1d\x00\x00\x00\x00\x00\x00\x10\x00\x00\xaf\xf6\xbd2') ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000680)={@private0={0xfc, 0x0, '\x00', 0x1}, @loopback={0x8000000000000000}, @remote, 0x6, 0x0, 0x18, 0x397, 0x5f1f, 0x82640250}) [ 1095.847833] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 [ 1095.860334] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.860334] 10:57:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6aa90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1096.022489] IPVS: ftp: loaded support on port[0] = 21 [ 1096.058925] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:57:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5f, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1096.231206] cramfs: empty filesystem [ 1096.383292] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.383292] [ 1096.472465] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.472465] 10:57:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd6a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:58 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000050000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6ba90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:58 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f000042e000/0x3000)=nil, 0x3000, 0xb635773f07ebbeee, 0x30, 0xffffffffffffffff, 0x3e74b000) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:57:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1097.025488] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.025488] 10:57:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6c000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1097.120138] IPVS: ftp: loaded support on port[0] = 21 [ 1097.120813] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:57:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd7a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:57:58 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000060000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1097.195151] cramfs: empty filesystem [ 1097.335032] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.335032] [ 1097.406538] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1097.413699] cramfs: empty filesystem [ 1097.414830] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.414830] [ 1097.545970] IPVS: ftp: loaded support on port[0] = 21 10:57:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0x3, 0xffffffffffffffee) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}, 0x80000002}, 0x1c) sendmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000240)="75ea8b50ddbf4338f94335e4b04bb0b3b2e6b1ce21765048c01bb12d6b4dd6fb6ad5994ac3c7970ed4b015b4efb7d1fa242ecbc97db27ed371815cf40eff3b0a0df66bda61944bf3a7e854a3aa5fdbe112404d8a05d7fda1051aef2fc0b21489d3839e1fae264738e52365564cc4a43ec89dd4936cdcd16685504e9092912a1a061a5a7bb37d270d5ed42602c5d6c03e2c10f41b290360bf6039217d629c2b825e9f4edeb95feb6c538ad7622d71701691d944dc06530f0b7147b27f6cea882f0306cd810e2ea303e92b97fbd05735b4de60713856bb8f7e2b8e6b7871", 0xdd}, {&(0x7f00000003c0)="b411dc9199005ea9a32b32f286b3b8085585dc3255f1f21592392e8c671c870f1e35495e25512ebf04dea14b047b497f5eba5069735618a696a9e6ad7cb23147a7c90802a8abee7363f7a9287c8b2d4367e21e08bd0f1695a8", 0x59}, {&(0x7f0000000340)="d1655a8848f276d8253224deac0ac0a75b1afefd4101e4cdd83323d3772d5fd41a2bdc96f548c802783b3eb385e0c512efddd53378117de6", 0x38}, {&(0x7f0000000440)="2e735f2d36764258ca6e296e57f875101b39243c02ec91aa60c1880c5f91cb83c6b6804502510aff1c561a9bb945d618d66e20ffc6a512402b8a3dd6b8999e7e0de7a9af2afe887f22d006e7f9367c78a84a8bce8075f9b3260486d066a41aff15328268", 0x64}, {&(0x7f00000004c0)="f9faa14ce113cf53c807c0b3e4144cd21e690288528dde27d323982707e3445c6c", 0x21}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) close(0xffffffffffffffff) r3 = dup2(r2, r0) setsockopt$inet6_int(r3, 0x29, 0x4, &(0x7f0000000580), 0x4) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup2(0xffffffffffffffff, r5) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000600)={{r6, r7+60000000}, {0x77359400}}, &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b04, &(0x7f0000000000)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x04\x00\a\x00\x00\x00\x01\x00\x00\x00\x00,C\xfdB\x00\x00\x00\x00\x00\x00\x00l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\b\xde\xbbg\xc18\x84,:f\xcb\xe8oOA\x8eYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c,\xe8\xff^9P\xee\x8aG\xdd\x00\x0e\xd8\x06\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW\xdc\xcf\xe9\x8d\xe8\xcf\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\x8a\xe3\x9c\x96\xf5\xf8\xb5\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v\xb3\xb1\x05\xa05\xdc\x12\x86\xb9\xf93\xac\x14\x1fXf\xfd\xde0\x83\xd9\xcc\xce]\xa5\x11V\x06$\xb3\xae\b8\xa5R\xa1\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1d\x00\x00\x00\x00\x00\x00\x10\x00\x00\xaf\xf6\xbd2') ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000680)={@private0={0xfc, 0x0, '\x00', 0x1}, @loopback={0x8000000000000000}, @remote, 0x6, 0x0, 0x18, 0x397, 0x5f1f, 0x82640250}) 10:57:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6ca90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd8a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:59 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000070000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:57:59 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1000000, &(0x7f0000000180)="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", &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)="402f11df69585a3265ce5ff8a0e32efaf9333e12ee1cf2615fba6216932d35f6c1fdd9190b8bb00f72440ac3d42fad822c3777db73bc45dc1bd12a987505e2be6886f4eece214d24071c430b3e0c52078badff3018fe5d1b71ac24ba706f2c8e490a4f20000299d5987d485b00395ac84ddef39d501ea76ce593f326f0541bbb8ae7b57b8fcf9c9e325470") perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) [ 1097.803149] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.803149] [ 1097.842663] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:57:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6da90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:57:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd9a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1097.893728] cramfs: empty filesystem [ 1097.896903] IPVS: ftp: loaded support on port[0] = 21 10:57:59 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000090000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1097.972293] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.972293] 10:57:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf9, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1098.114175] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:57:59 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000180000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:57:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6ea90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1098.141754] cramfs: empty filesystem [ 1098.224950] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.224950] [ 1098.355744] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1098.366320] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.366320] [ 1098.391702] cramfs: empty filesystem [ 1098.659086] IPVS: ftp: loaded support on port[0] = 21 10:58:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xd8a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xdaa70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6fa90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:00 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000200000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:00 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) unshare(0x20030380) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1098.931479] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:00 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000230000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x70a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1098.953686] cramfs: empty filesystem [ 1099.073251] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.073251] [ 1099.091005] IPVS: ftp: loaded support on port[0] = 21 10:58:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xdba70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x6ca90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1099.132663] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:00 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000003f0000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1099.211079] cramfs: empty filesystem [ 1099.241182] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.241182] 10:58:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x71a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x223, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1099.432343] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:01 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0xc110, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/block/loop0', 0x0, 0x0) r2 = creat(0x0, 0x3) sendfile(r0, r1, 0x0, 0x80000000) write$binfmt_script(r2, &(0x7f0000000340)=ANY=[], 0x191) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, 0x0, 0x4800) timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0xd8, 0xc3, 0x3, 0x0, 0x8, 0x200, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x0, 0xf12}, 0x100, 0x0, 0x1, 0x0, 0x9c, 0x8, 0x9, 0x0, 0x5, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x1a) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) timerfd_gettime(r1, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000780), 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0xb) timer_create(0x2, &(0x7f0000000000)={0x0, 0x39, 0x2, @thr={0x0, &(0x7f0000000200)="795c65ccd036c637a164a3d74cbf5a222617475e3bf9d81058fa5ee84d5d7aa1ae0ff659b751643e96e08ebb74e4724d7369259b07eb9a08d0051e58a77eb013bb29af8d52f8fe5db50deb5308ec6dcd8b16b5441ff01e73abec1ab8d56dce4e9dbd1ce8cd838542b94e65f9387728b68470"}}, &(0x7f00000000c0)) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000800)="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", 0x2000, &(0x7f0000003540)={0x0, 0x0, &(0x7f00000001c0)={0x18, 0x0, 0x7, {0xfffffffffffffffc}}, 0x0, 0x0, &(0x7f0000000480)={0x28, 0x0, 0x0, {{0x2}}}, 0x0, &(0x7f0000000540)={0x18, 0x24, 0x80000001, {0x8001}}, 0x0, &(0x7f0000000600)={0x20, 0x0, 0x1f}, &(0x7f0000002d40)={0x78, 0xffffffffffffffda, 0x9, {0x0, 0x7, 0x0, {0x0, 0x0, 0x0, 0x7, 0x5, 0x0, 0x7, 0x7f, 0x1, 0x8000, 0x5, 0x0, 0x0, 0x3}}}, 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="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"], 0x0, 0x0, &(0x7f0000003500)={0x20, 0xfffffffffffffff5, 0x9, {0x0, 0x0, 0x401, 0x5}}}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0xb) 10:58:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xdca70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x72a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:01 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000400000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1099.480909] cramfs: empty filesystem [ 1099.763800] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.763800] [ 1099.803585] IPVS: ftp: loaded support on port[0] = 21 [ 1100.044166] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1100.050803] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.050803] 10:58:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x73a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xdda70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:02 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000600000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:02 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000002540), 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000200)={0x40, 0x5, &(0x7f0000000000)=[0xa91, 0x7, 0x222f, 0xfffd, 0x200], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x2, 0x1, 0x6f2, 0xffac], &(0x7f00000001c0)=[0xb5, 0x8, 0x4, 0x7, 0x4, 0x4, 0x1, 0x7fff, 0x4]}) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/user\x00') mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x40010, r2, 0xe926f000) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f0000000240)) r3 = syz_mount_image$bfs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x9, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="c3a6091bec6d35bf6eed9babba3bad0017c76ef8fcf830a3b209efaa98df296fa586e9ecc79f933590ddf9a07a245a43d2c425555492ea82f38e4e3926f5666a7b31bc1f2caf4d5f9275102bb73f99f48df88c0d4bc5719a8a221f8fc142e0e0d49ad007ba553f9ec13f8972bc046c795fb7705ef15f", 0x76}], 0x2, &(0x7f0000000540)={[{'/dev/fb0\x00'}, {'/dev/fb0\x00'}, {'!}\x91&'}, {'\x00'}, {'\x00'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@dont_hash}, {@appraise_type}]}) write$binfmt_misc(r3, &(0x7f00000005c0)={'syz0', "82a88a9415d7b3a7da7372027b76c3380ce2e7628497e334d3e8da843b8d398941263d7128352b51292caa0fa4e0a49dc745d4b8290910ad8ab620934dc917a53e0b5773bb10009527ac895e53d378c21576abf2c7d082d8b92043a730e3374fc7eacc53eef54e0ec49ae668db0a0d8b52fa03a37bc52a052575d52c2f38a092e83166b74bcc606aa11ccc220b"}, 0x91) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) ioctl$FBIOGET_VSCREENINFO(r4, 0x4600, &(0x7f0000000300)) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0xa0, 0x80, 0x0, 0x0, 0x0, 0xfffffffc, 0x8}) syz_mount_image$msdos(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000740)=[{&(0x7f0000000700)="93043f3f98", 0x5, 0xb066}], 0x2001, &(0x7f0000000780)={[{@fat=@dmask={'dmask', 0x3d, 0x2}}, {@nodots}, {@nodots}, {@fat=@showexec}], [{@obj_type={'obj_type', 0x3d, 'syz0'}}, {@seclabel}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_lt}, {@smackfshat={'smackfshat', 0x3d, '!}\x91&'}}, {@smackfstransmute}, {@dont_measure}]}) 10:58:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3b1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:02 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000, &(0x7f00000004c0)="64f8ca82f6432c6202579acf8605f4671c190f33c7e86bc75671f18afef566630286c03550eb5d4c666ec012a1cb9b7d635b84358c8cc0051b1c4d4669cbd91b513b75abb16d1633d7bbe67170d38ef991e03a6ad5ca494513d8909f76c403b89d0047ff88e375fdd6623b5780f736756473856a12e08accbad494c0649756685a4d0ac0344d01db99531d13e4171b836ae45e213a086104e3e9f100d980faf412d780000accfbdd9e1fed4311ccae1ce7396f808e045e0109530ec3576f99c85b241bf4c604c759a31f3ae5c0", &(0x7f0000000280), &(0x7f00000005c0), &(0x7f0000000600)="238574074e2f3fa475f3e4e6a35deb399acbd04d699e198b50c4887f6bc17461f01335a8ee6f70c0f72eeb9876ee269a237c2e0837a84bb56cba840d5eb6306de209c100ea62a33a339ffa32a88bfcf3bc2d6530dc07201a32fea92f06ca71397fe2c8f518f13a9d1a1d1ee0fdc0a832a2ad7c05d07bd5f4aaf7ebe07af032432842bbd295ad3b28b9043fb24492349d8e4f3a45") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1, 0xff, 0x1, 0x0, 0x0, 0x2, 0x2300, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x6, @perf_config_ext={0xfa9, 0x50}, 0x20, 0xffffffff, 0x3, 0x5, 0x100000000, 0x3, 0x40, 0x0, 0x6, 0x0, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) clone(0x80, &(0x7f0000000040)="a8065c3a3c4a0117bfb8a1b037fe7f9f562d08c8f46c73ea6df5d170b7c9d528415e5945a0fb", &(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000700)="edd0ffac94be7385192922acd412e3630e19f85b28e0cb31b26850be8798fe03225f8da6a2225f2acd2c08286bdd29b2ceed807b43351fad20e3409101a58853ab04baa6ff670d497a5a908cbf0820c46fa5ff72d4285b1766a27bc8647030a9129b5b305d118cccfbb9") open(0x0, 0x141042, 0x0) clone(0xa6fac6c3dbbdf921, &(0x7f0000000180)="7254f621e0e101cf2dd717e1a86283c621b96489bf25bf1773e7da2d57bcd4857935a66a5b8aeec4384116420130b776e30e3ae16fad968c91432b1ff71c458be5c8b0aa19f62ed6faabc0cfa72f0b8ffaaf15fc3dfd311a501b6c2b0ba2fd069d627e3cefa8b3c268f3a9664a8f89d8bbf845f47904e9b8f6cd3f47c3de9ab9c2031b9334", &(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)="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"/280) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1100.085371] cramfs: empty filesystem [ 1100.564457] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.564457] [ 1100.604965] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x74000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xdea70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='bic\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f0000001440)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001b1d77ba00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f66e02e36daf65654e57cb64f20a7cc3c1eb4bc99db7fd4e0f531def454909f5c8da7103f04e1cfd430c32c2444e8a2a303d486ffd421cb2890c14bae7b5f2be8f5d009708064954a5c2e163bdb65d0f936831fc05acafa0c091a3cc1876a6704e4aab88f4393d42b8c66c4d1faf9a0549a38ccf0b6dfc12af2de47a0154a91e029d871ebcc1eae4b57532fc1ebe769c563905d7df2eab7c661e7f2e3ed9cf948fe01a04a3c51eadfa15b892c00543006fea74af202de31b"], 0xa78) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x31}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0x100000530) r1 = dup2(r0, r0) accept$inet(r1, 0x0, &(0x7f00000000c0)) 10:58:02 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x8, {"a2e3ad21ed6b52f99cfbf4c087f70eb4d04fe7ff7fc6e5539b366e0e8b546a1b5d52940f0890e0878f0e1ac6e7049b61b4956c409a242a5b67f3988f7ef319520100ffe8d178708c523c921b1b29300a0d9b44d336cd3b78130daa61d8e809ea882f5802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae193973735b36d5b1b63e91c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecd03aded6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71b1931870262f5e801119242ca5b6bfc821e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27afc953854a642c57519544ae15a7e454dea05918b4124351601611c8f11baa500a3621c56cea8d20ff911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a60560a22f1fca567e65d5e880572286522449df466c632b3570243f989cce3803f465e41e610c20d80421d653a5120000008213b704c7fb082ff27590678ef9f190bae979babc7041d860420c5664b27921b14dc1db8892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710ac0000000000008000bea37ce0d0d4aa202fd28f28381aab144a5d429a04a689b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2f05dd3318271a1f5f8528f227e79c1388dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eefc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a9737d214060005ea6f1783e287b3bee96e3a7288afe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f4350aeae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf02b98a269b891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f3927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615f7084a607a7eceb6243378e0610060f02cca4051c2f001edb3d78fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c4e15a7b6eb65ca8104e1b4da1fbb77ab2fc043aead87c32ab875ee7c2e7b7019c902cd3b43eaeb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad948741b2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd73643de50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd75c2f998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73c497579773767075428067e7f16f4dde374f8211fef42cb468e623daf60b3569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe29068c0ca3d3414442e863a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae44369ddb4581c55925d0f6f1ba571eba281f259152f85a654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e05130935e00785ec27e923911fab964c271556527697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9ddbfb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afae5336651b1b9bd522d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d5439020484f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee29165895ac4b008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463181f4b87c10772d2b13f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76d57227ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f84fad6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21e35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc238a081ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4908b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c60edddab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb1575912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec014508e5247d33ae6c962d35603ff8454c16f8342856935125102bb784ed714887071f3d998efdd9923c954ab6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee658e4cb5e930ed624806c43a006dc9336d07c2b8081c128ad2706f48261f7897084c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da3932ba5c04c24a560ad80a3ce654578376e599aff3565b1d531f30912b99e6619ebe93cc0b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e6491953264d2700c838fa2c7b34252600c9654e502dcea39cb6bc3eb69992e234b4ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b01faffd0a5dbed2881a9700af561ac8c7e36bb2fc4c40e9cf96f06817fb903729a7db6ff957697c9ede7885d94ff1aa70826ad01a9b03c37b0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000", 0x1000}}, 0x1006) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0xe060280) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:02 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000c0ed0000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1100.665139] cramfs: empty filesystem [ 1100.791496] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.791496] 10:58:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xdfa70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb00, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1100.965821] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x74a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:02 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd2800200000030000000fff0000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe0030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x75a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1101.015250] cramfs: empty filesystem [ 1101.314443] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000400436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe0a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1101.411116] cramfs: empty filesystem [ 1101.688286] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value, 0x8) sendmmsg(r2, &(0x7f0000002000)=[{{&(0x7f0000000240)=@hci={0x1f, 0x4, 0x3}, 0x80, &(0x7f0000000880)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)="cde65da0a0c099d89dbf4c44e43890758a8a71c9ea2362adc4d072cde193a53f2aa6b82337ea57c5f4b2b96b878a94155c3cfe6df57727b7928a4e6f5c900f37773b7fdad4cc29d62695576c49b1e0a5be7049635b0fd68a231bcceda4803a48da72c0f1e30a9ad3adccb413b5307fefb834e30b071ed92f4e4ed9395e4a356257f497d97b4c6d8b702e4bd0da14e0d8df866459d4d5b62b571c979cc319511058cb2d601701bfbc7d5ce82f17d929a836fa36967ac4f1f0be6a913b61ee3950d107ffe34e1a5e2745b2f7da818e21c17dce869d499201dca53da16e1e73c64cb9b2730857a195207d20d441c8c5a478751621", 0xf3}, {&(0x7f0000000400)="bf3c9ea477394b59062f63a2a69ced83f3c670dff01ee6b4e04f85da658879096455fbd3f2493b3d4f7d86290d120a6c1cf833fc3798cb5aa9fd5f19bdb25a4b219578c8029ece969a978a52cf8d819f6c973039827a06fe8cdd4b61d66f41018f25bb36688d88de4f5ac7c4513af081316ece4ed4636e38881b0dfd29702dd245d53abc7ce9700b12a65f528db687e9862de257d18bc366d76437a409c73b51fb68d09a50aebb87517151f5e40453409af498", 0xb3}, {&(0x7f00000004c0)="aef9240c7d1442e32020257cc2fde4c188f00147cabd40a0a204d492e5414d92c0ad66b15ea784aa5ce7a8841e97a93dde7e734366f4c75861dcf8af169d21b9dd22316fa293e0e83f575e5feea8f722ca", 0x51}, {&(0x7f0000000540)="9246c3aac2f2bae7dd6178fccc99958a991c1295821e082cb87e6e47b43943f7abb8d51368ff040eec6130b7e43345711b470394dcc4abad2f8983227f049f42c2c4c50ebe0b9961640bc51c26beefac01f5f4a0849f3d1eb5fedcfe5392f15ac3a802772fdada2ce5087a4cc51954dae5388e3c5d522ef63f411cb6f614", 0x7e}, {&(0x7f00000005c0)="c620615b84983987f428037304206fe25ec0822daea119b830c62d1bd39d4fa0b77ede94652722fd27079a5f9c2c0fe19b583f132acbbd10657ffed1e842fe7f3d0626eebbf4d249761199f208e0ba7cadc847bf7b3423e1be7aabddf60fbda5f581fff7ca7219b26a678451be5752c9ca4e9c2d170850cbae39e5d32f32893ad0f3f8eaff13dcbbd6d70efbf3fea178c8dd3d6eb3e278526f9dd9eb06ea679299ff61afe1464ddfb058efd6d5fac1c632561ea56adca94b8dcf4e2aaa7ffe238e", 0xc1}, {&(0x7f00000006c0)}, {&(0x7f0000000700)="cd03ca4be8247d1559e3fecac27e483706db4511762dee534fa791e2247765aefea51dc3b334e17735", 0x29}, {&(0x7f0000000740)="81942fd500d751b6891496db03f24a98a97a4a62f276dae710a011d7cc7f787bad7d1a11028a92f69a0d9baac1b2ec42229946d2523babcc2ba8b1e8b07726bfdf238be35865b49079aff7f3d433d548c044999a0ce5c8ee375a0450fba8ae33f933902f8fc65f81a504af400c09634f3146a9167ab24a3e12b45a", 0x7b}, {&(0x7f00000007c0)="bdbc51f33243b40218230ba32fa847adcea1ddc70ca0e226ffe8dff73baf9e7db414190f7bd5daa09760fffc3ac85eb8697f424345c8ba9f015d8652b7480f16445c48586565e488ed376e491960b58e8ab7fb9e19f2466d47ad715b1a229104778eb194d0d3d1c42594a153a20f5c1c8dc0bc7c6525987ed712aa0cb7876f613d14012ca41e2d6cedd2fcf62b8d2f0a3c9a7b85a21b36308f35e9ce86b2220786265c542779eb75985aecb0e3d49b", 0xaf}], 0xa}}, {{&(0x7f0000000940)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000009c0)="5271e160b8fbd12f39ff5f1d027491b3ef5699ba5070ebd3b17aa9cd89dc2b626f329bef3ad8dc289bbf02af0dc6171c0a0ab8926d1823b7cad385c673929ecc8c91fed35f624641df6511af04fbfee08d51217915306bbb9d78c037b31143a0ede1cca8851d056225d0d122f5bbeda4a3a2cf0ee2c54ceb3a8969e0b7b676270029fb76662787344bde53950f5d3e90163b26bb7117cf4b0c3ff5c59ce32a042ab7cf03eee5a080521bdca3e455f385fd628dc570", 0xb5}, {&(0x7f0000000a80)="d32187a0f51bd8395afc749ff5b7943557c218957449216fc2ecf5477983cf865cc3a8f7b8f2c08529e104582feea9057fb9e069cda9407162bc98427df57cb6c1817e69c53db79a5c50b5cf7ee55a62d81ee6a3dc0944319877e9470eb6a1eef2ed334194389dc32f70ebc98f50483d893b8f40a88dcf76fb19ade5512d4fb60fac601486da458f98b787d2a36fa3b6ae64e0217034448b0eaf2b45a5b29df10d0a0dc297b57225a0", 0xa9}], 0x2}}, {{&(0x7f0000000b80)=@l2tp6={0xa, 0x0, 0x4, @mcast2, 0x9, 0x4}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c00)="72f1649cd79dd55f3d718bac6cdf8e1820c3c0da77326fa48ce1d9d1735d93aedc720cfb4c672f59ff251ae86f18e3256ee491f9a5087fdca4d00b9f693113185382d2a7991672099b4b2c420ad31ec26954d442b99c3fba67af569693dd14cfdd836065cb0b455aac5e0cbdbdca0dc1586e804a3d25801d4a765bf1b3f015fa8c5faeb800135069154fbaa24b63d42179215a455b19cd1af416633175832a9e2b4c6a814599a38d663b228ec1efe35fcec443d95dabf68de4c581d773730915f2ca94569d576dd45f3da3e811fb5c44e8226cd3c7", 0xd5}], 0x1, &(0x7f0000000d40)=[{0x20, 0x107, 0x80000001, "e34077e1d7f06d2810372868617b3a"}, {0x1010, 0x11, 0xd9, "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"}, {0xe0, 0x117, 0x9, "f0bf77343aee56149da8758dcc7218641028ae67dcefe17b2197434ad1add3adfdaf10bba6b4d589b23cd7c77f5d6ddd9ca236dac44a2e3d0aff685157165b6a7ac26f4553530ad708dae7a4c30cd659f2b76224262890a47da943592228cb5fb81a7760e29286215574706e01132e9235cb71a3c86681a0b8ca85c84d08de29bffa071fb73477a760dbb2e798ddbe6bca2f177982ea0bb1992a98baa36a2805b1e117afa2888fe0cce1052f38e16986386400b4f0daa78193106f3f10f468b3ceca056c0dc11131a62ec7"}], 0x1110}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e80)="bf094ae4b01676f546effa35c0d652322573d51904e1e4a42d7b2cdd724b8f967a7d5f3e32fd5cb3f3360f16d9fd1dea260cb0", 0x33}, {&(0x7f0000001ec0)="8637db6f7b58753024ee3719b57c7dfdf769ab27ed83959f57e8ad81faf1ccfb548c0576955e85226ddfaf7e1c9d5b721f6504ceb12abe5e214e0d358fe48e4772b96446b6d03fdfe3888a26a5adedd42a17ac968817968ca87a9bf5f2b2384cebf00b5abd2ea4b417a411be3baea4899ba265bf7a8f421e56c50a0849d33e6ad0c0b60b730c2c61efc551f47c5a500aef82bf4205807f233cc4195c41db63c8fc4835d4382c242b2ac7bfcb24cd38e75714d9af61cd60c1210b229afc69e1005505", 0xc2}], 0x2}}], 0x4, 0x4040000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x181, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './bus\x00'}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r4, 0x7a6, &(0x7f00000001c0)={0x5417, 0xa24, 0x8001, 0x7, 0xa38b, 0x7a}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='\x00') ftruncate(r2, 0x200002) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x129) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r6, 0x0, 0x0) sendfile(r5, r6, 0x0, 0x7fff) 10:58:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000001000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x76a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe1a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfff2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1101.780264] cramfs: empty filesystem [ 1102.210811] audit: type=1800 audit(1634900283.794:93): pid=27043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=14304 res=0 [ 1102.237641] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000ffff1f00436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x77a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe2a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:04 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x8, {"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", 0x1000}}, 0x1006) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0xe060280) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1102.281576] cramfs: empty filesystem [ 1102.591567] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:04 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890c, &(0x7f0000000600)={0x0, @l2tp={0x2, 0x0, @empty}, @sco, @nl=@unspec, 0x700, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000340)='syz_tun\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001b00)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000680)={{}, r1, 0x4, @unused=[0x101, 0x2, 0xfffffffffffffffe, 0x8], @name="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"}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000240)={{}, r1, 0x4, @unused=[0x2, 0x1000, 0x6, 0x7], @subvolid=0x9}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000080)={"1d8e8abea9f5deb4d36159dc068d0d54", 0x0, r1, {0x7, 0x5}, {0x9}, 0x8, [0x6, 0x8000, 0x8, 0x80000001, 0x6, 0x81, 0x4, 0x4c, 0x4, 0x5, 0x200, 0x3a3, 0x77, 0x892, 0x1, 0x3]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000200)={0x0, 0x2, 0xfffffffffffff001}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000600)={{}, r1, 0x10, @inherit={0x58, &(0x7f0000001d00)=ANY=[@ANYBLOB="0100000000000000020021000400003f9b9233a4585d4a729c03b549c50b2e54b500000000000000000000000000000300150000000000ffffffff00000000fbffffffffff050000000000000000000900000000000000faffffff000000000000000000004000fefa561b39c70b70aaa6fb50bffd803ceceae5d2a7be5817f9cc351669b006de5538231ed5a50e89ec56b8b326d1827d9b60627435a44b813bb9feffffffffffffff46cca947bfb4be9bb1eb682803a546c48b3f150cab940965591a2aeaf5d3400940557c77873b21bb98"]}, @devid=r2}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001680)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000580)={{}, 0x0, 0x12, @unused=[0x9, 0x0, 0x0, 0x20], @devid=r3}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000600)={{}, r1, 0x4, @unused=[0xffffffff, 0x4, 0x8d2, 0x5], @devid=r3}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000180)={r3, "332af8da29dc776e79162e6adefba8e9"}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfff3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:04 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000001436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x78a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe3a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1102.625601] cramfs: empty filesystem [ 1102.894279] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1102.908038] IPVS: ftp: loaded support on port[0] = 21 10:58:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfff9, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:04 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000002436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe4a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x79a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1102.983650] cramfs: empty filesystem [ 1103.214130] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:04 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000003436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x7a000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1103.280987] cramfs: empty filesystem [ 1103.475937] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1103.523563] cramfs: empty filesystem [ 1103.631416] IPVS: ftp: loaded support on port[0] = 21 10:58:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) fallocate(r0, 0x0, 0x0, 0x3) creat(&(0x7f0000000000)='./bus\x00', 0x0) 10:58:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe4ffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:06 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000004436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x7aa90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:06 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) unshare(0x40000000) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x519d, 0x700}], 0x2012, 0x0, &(0x7f00000000c0)={[0xffffffffffffffff]}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1104.657388] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x7ba90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe5a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1104.700383] cramfs: empty filesystem [ 1104.739608] IPVS: ftp: loaded support on port[0] = 21 10:58:06 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000005436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x7ca90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe6a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1104.985827] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:06 executing program 1: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000005436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:06 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000006436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe7a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x7da90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1105.050171] cramfs: empty filesystem [ 1105.318747] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1105.380337] cramfs: empty filesystem [ 1105.493983] IPVS: ftp: loaded support on port[0] = 21 [ 1105.642802] IPVS: ftp: loaded support on port[0] = 21 [ 1105.767762] IPVS: ftp: loaded support on port[0] = 21 10:58:08 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r1, 0x0, 0x4800) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x3, 0x80, 0x8, 0x40, 0xff, 0x9, 0x0, 0x8, 0x4100, 0xe, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x7, 0x2}, 0x200, 0x5c, 0xfffffffd, 0x5, 0x80, 0xff, 0x9, 0x0, 0x8000, 0x0, 0x4}) unshare(0x40000000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:08 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000007436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:08 executing program 1: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000005436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x7ea90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe8a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff9, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1107.349188] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:09 executing program 1: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000005436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:09 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000008436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe9a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x7fa90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1107.377030] cramfs: empty filesystem [ 1107.502670] IPVS: ftp: loaded support on port[0] = 21 10:58:09 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) unshare(0x40000000) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x519d, 0x700}], 0x2012, 0x0, &(0x7f00000000c0)={[0xffffffffffffffff]}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1107.616379] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1107.647511] cramfs: empty filesystem [ 1107.782915] IPVS: ftp: loaded support on port[0] = 21 [ 1108.294180] IPVS: ftp: loaded support on port[0] = 21 [ 1108.326826] IPVS: ftp: loaded support on port[0] = 21 10:58:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xea020000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:11 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000009436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x80a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffff2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:11 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x40, 0xff, 0x0, 0x0, 0x3c40, 0x8420, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a65, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6b1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0x40000000) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:11 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890c, &(0x7f0000000600)={0x0, @l2tp={0x2, 0x0, @empty}, @sco, @nl=@unspec, 0x700, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000340)='syz_tun\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001b00)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000680)={{}, r1, 0x4, @unused=[0x101, 0x2, 0xfffffffffffffffe, 0x8], @name="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"}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000240)={{}, r1, 0x4, @unused=[0x2, 0x1000, 0x6, 0x7], @subvolid=0x9}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000080)={"1d8e8abea9f5deb4d36159dc068d0d54", 0x0, r1, {0x7, 0x5}, {0x9}, 0x8, [0x6, 0x8000, 0x8, 0x80000001, 0x6, 0x81, 0x4, 0x4c, 0x4, 0x5, 0x200, 0x3a3, 0x77, 0x892, 0x1, 0x3]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000200)={0x0, 0x2, 0xfffffffffffff001}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000600)={{}, r1, 0x10, @inherit={0x58, &(0x7f0000001d00)=ANY=[@ANYBLOB="0100000000000000020021000400003f9b9233a4585d4a729c03b549c50b2e54b500000000000000000000000000000300150000000000ffffffff00000000fbffffffffff050000000000000000000900000000000000faffffff000000000000000000004000fefa561b39c70b70aaa6fb50bffd803ceceae5d2a7be5817f9cc351669b006de5538231ed5a50e89ec56b8b326d1827d9b60627435a44b813bb9feffffffffffffff46cca947bfb4be9bb1eb682803a546c48b3f150cab940965591a2aeaf5d3400940557c77873b21bb98"]}, @devid=r2}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001680)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000580)={{}, 0x0, 0x12, @unused=[0x9, 0x0, 0x0, 0x20], @devid=r3}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000600)={{}, r1, 0x4, @unused=[0xffffffff, 0x4, 0x8d2, 0x5], @devid=r3}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000180)={r3, "332af8da29dc776e79162e6adefba8e9"}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1109.529454] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:11 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000018436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffff3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x81000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1109.551846] cramfs: empty filesystem [ 1109.622068] IPVS: ftp: loaded support on port[0] = 21 [ 1109.693522] IPVS: ftp: loaded support on port[0] = 21 10:58:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xeaa70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1109.721622] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1109.722664] IPVS: ftp: loaded support on port[0] = 21 10:58:11 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000020436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x81a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffff9, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xeba70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1109.777726] cramfs: empty filesystem [ 1110.057497] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:11 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000023436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffffa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1110.123869] cramfs: empty filesystem [ 1110.360359] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:12 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, r0, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) clone(0x24040400, &(0x7f0000000400)="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", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1110.430166] cramfs: empty filesystem [ 1110.693891] IPVS: ftp: loaded support on port[0] = 21 10:58:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x82a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xeca70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="5f465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:12 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd2800200000030000000000003f436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:12 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d140)={0xfffffffffffffffb, [], 0xed, "7987d178d2e200"}) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "2156816c73038c"}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="001d000004d0ba89d582b7dab4761e3ef83294873e61c419ddbf4a615b756f05d6c96cccdb7eb07631317bc958329d7e40c034d5fd577d796595d1878adbc726eba891bc0a6f9802c47dd5dad6fdc4867bec6877e334fd1b69e0", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000000400048010000c800c000b8008000a0000000000bc00088024000780080005000000000008000600000000000800050000000000080005000000000014000780080006000000000008000500000000000c000f8008000500000000004c0007800800050000000000080006000000000008000500000000000800050000000000080005000000000008000500000000000800050000000000080006000000000008000500000000001c0007800800050000000000080005000000000008000500000000000c000780080005000000000008000200010000000800010000000000"], 0xf4}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r8 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$USBDEVFS_IOCTL(r8, 0x8108551b, &(0x7f0000000380)) r9 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r9, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r9, 0x80089419, &(0x7f0000000000)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000025c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}], 0x0, "b67d5166ab9c79"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {0x0, r1}, {r6}, {}, {r6}, {}, {}, {0x0, r7}, {}, {r6}, {0x0, r7}, {}, {r5}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {r6}, {0x0, r7}, {0x0, r7}, {r6}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {r6}, {}, {0x0, r7}, {}, {0x0, r7}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {r6}, {}, {}, {0x0, r7}, {}, {r5, r7}, {}, {r5}, {}, {r6}, {r5}, {}, {r6}, {}, {}, {}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {r5, r7}, {}, {}, {}, {}, {0x0, r10}, {}, {r6}, {r5}, {}, {r6}, {}, {}, {}, {}, {}, {}, {r5}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {r5}, {}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {r5}, {}, {}, {}, {r5, r7}, {0x0, r7}, {r6, r7}, {r5}, {}, {}, {r5}, {r5}, {r6}, {}, {r5}, {r5, r7}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {}, {r6}, {}, {}, {}, {r5}, {0x0, r7}, {r6}, {r5}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {}, {}, {0x0, r7}, {r6}, {}, {}, {}, {}, {}, {r5, r7}, {r6}, {}, {0x0, r7}, {}, {r6}, {0x0, r7}, {}, {}, {r5}, {r5}, {}, {r5}, {r6, r7}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {r6}, {0x0, r7}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {r5}, {r6}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {r6, r7}, {}, {r6}, {r6, r7}, {}, {}, {r5}, {}, {r5}, {r6}, {}, {r5}, {}, {}, {}, {r6}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {}, {r6}, {r5}, {r6, r7}, {r6}, {0x0, r7}, {}, {}, {}, {r5}, {}, {}, {}, {r6}, {r6}, {}, {}, {r6}, {r6}, {0x0, r7}, {}, {}, {0x0, r7}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e140)) [ 1110.952763] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:12 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000040436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="c6465331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xeda70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x83a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e6400000000040002800c000100aaaaaaaaaabb0000"], 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 1111.001024] cramfs: empty filesystem [ 1111.245274] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xeea70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1111.289572] cramfs: empty filesystem [ 1111.481186] IPVS: ftp: loaded support on port[0] = 21 10:58:13 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000060436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x84a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a455331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r1, 0x0, 0x4800) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000140)=0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x8000) sendmsg(r0, &(0x7f0000000080)={0x0, 0x33, &(0x7f0000000100)=[{&(0x7f0000000000)="060004010300072a", 0x584}], 0x1}, 0x0) 10:58:13 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xefa70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1112.225255] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:13 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, r0, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) clone(0x24040400, &(0x7f0000000400)="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", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a475331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1112.269839] cramfs: empty filesystem [ 1112.333908] IPVS: ftp: loaded support on port[0] = 21 10:58:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf0a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:14 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000ffffff8c436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x85a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1112.555642] IPVS: ftp: loaded support on port[0] = 21 [ 1112.596872] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf0ffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a5f5331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x86000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:14 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd2800200000030000000000edc0436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf1a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1112.661114] cramfs: empty filesystem [ 1113.020715] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1113.081849] cramfs: empty filesystem [ 1113.236995] IPVS: ftp: loaded support on port[0] = 21 10:58:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x86a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4ac65331010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:16 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fffffff0436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:16 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) clone(0x1002000, &(0x7f0000000180)="bd857b84a0fd", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="92664a0bdd2a67b2e93a107be1d279a0642460") ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf2020000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:16 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, r0, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) clone(0x24040400, &(0x7f0000000400)="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", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1114.893334] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:16 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fffffff5436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a460a31010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1114.907559] cramfs: empty filesystem [ 1115.027234] IPVS: ftp: loaded support on port[0] = 21 10:58:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x87a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf2030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1115.113473] IPVS: ftp: loaded support on port[0] = 21 [ 1115.195409] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:16 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fffffff6436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465f31010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf2a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1115.279920] cramfs: empty filesystem [ 1115.466169] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x88600000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:17 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fffffdfc436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46c631010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf3a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1115.521831] cramfs: empty filesystem [ 1116.070531] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1116.112664] cramfs: empty filesystem [ 1117.010014] ieee802154 phy0 wpan0: encryption failed: -22 [ 1117.019409] ieee802154 phy1 wpan1: encryption failed: -22 10:58:19 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, r0, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) clone(0x24040400, &(0x7f0000000400)="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", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x88a8ffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:19 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x5118, 0x700}], 0x200000000000019e, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46530a010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:19 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fffffdfd436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf4030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1117.990719] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1118.063470] IPVS: ftp: loaded support on port[0] = 21 10:58:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf4070000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x88a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1118.076925] cramfs: empty filesystem [ 1118.089689] IPVS: ftp: loaded support on port[0] = 21 10:58:19 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fffffffe436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46535f010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x89a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf4a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1118.423311] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1118.520005] cramfs: empty filesystem [ 1118.645345] IPVS: ftp: loaded support on port[0] = 21 10:58:21 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, r0, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) clone(0x24040400, &(0x7f0000000400)="7ae152c4d8898debe2de3aad4ef5ffcd40c180c3655736e6113546611b6f43afc5cb9033a779d5b76a7f003c3f159c454245b07fe67776395a450d4ad75a27828228611746eb348b621e2055217a994a7cedef83592588b22dd6779f34f5ccd8e0048a04f0d99ea7d71eb49d7e87f9c0b12b3f1d46ca6cc9b830ee8c2d57a5d26d28991b542fb90822a1423a3059f9df2be010f1d64148af845138fe3f3db7b334600988e498ce33bc1fc5dd7e42d010c5ade996cd2eae09a3030d219728980b533f4c463e6fa2b4675af972000000002861dd91fcba1e56568c00e56b8a241fef7998adf926d03f362c49c2f8d9c32b569dafce942d36aa2a029898d4a9c4405de9d0b422e879be5edc97c43a29efb2e5a2d5df910d66c0b78a56514a9d65883db0ec6fd3382796c431c21c03426e3b3cab48d132548ca0d6a84f8157ebdf066ee6e870fe75541ca8c8ad13c65153e56fabd7fe8fc6565d63bddfb8bebc52bd4844645021a567f7dd81ca50e3d7a214f89b4fafb9afb5a5d76ab3f4d2", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:21 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653c6010000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1119.785370] IPVS: ftp: loaded support on port[0] = 21 10:58:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf5a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:23 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000fff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x8a010000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:23 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331020000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:23 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, r0, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) clone(0x24040400, &(0x7f0000000400)="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", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:23 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000003c0)={0x9e0000, 0x0, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0xfffffffe}}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[@ANYBLOB="180533f63277b871a46f06c70502fa1b054907fb64005cb87aad7f1f226089084ac52238f5ceae32dde2005d45ee2f2ae34f22e7b15985f99382307e165e366634c347640e331afe9263a84443fd41daf44f7b7f6699bfd58f4f751d2c1fd69f42d816567c36a6ef74a84a5250ab44a531d1682eac007e2814c17f85f28454fcc4905869b79074f1c698a1237cbc1c73c9d554e4eb94f7d7e4e9"]) open(0x0, 0x141042, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) write(r0, &(0x7f0000000280)="f059bd3a3768b38f0029292bb8afe0c50b287ae52438435bc38b76f79285f1251801155c32346ac0dd4cd8727da817a16638218802d460a568dd70502424ba3ccfea44c8e5621a8c9ddb6ed0e7ad92db", 0x50) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r1, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000240)={0x0, 0x6}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) clone(0x10210000, &(0x7f0000000180)="c72776f9149212560147ad1521774f09f7491e772296fa64a36dcee58931fa", &(0x7f00000001c0), &(0x7f0000000200), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1121.780486] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1121.810224] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1121.810224] 10:58:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf6a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1121.832969] cramfs: empty filesystem [ 1121.870971] IPVS: ftp: loaded support on port[0] = 21 10:58:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x8aa90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:23 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000001fffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1121.934388] IPVS: ftp: loaded support on port[0] = 21 10:58:23 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331030000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1122.109335] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x8ba90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf7a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:23 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331040000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:23 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fcfdffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x8ca90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1122.257740] cramfs: empty filesystem [ 1122.445387] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf8a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1122.480951] cramfs: empty filesystem [ 1122.668265] IPVS: ftp: loaded support on port[0] = 21 10:58:26 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000003c0)={0x9e0000, 0x0, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0xfffffffe}}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[@ANYBLOB="180533f63277b871a46f06c70502fa1b054907fb64005cb87aad7f1f226089084ac52238f5ceae32dde2005d45ee2f2ae34f22e7b15985f99382307e165e366634c347640e331afe9263a84443fd41daf44f7b7f6699bfd58f4f751d2c1fd69f42d816567c36a6ef74a84a5250ab44a531d1682eac007e2814c17f85f28454fcc4905869b79074f1c698a1237cbc1c73c9d554e4eb94f7d7e4e9"]) open(0x0, 0x141042, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) write(r0, &(0x7f0000000280)="f059bd3a3768b38f0029292bb8afe0c50b287ae52438435bc38b76f79285f1251801155c32346ac0dd4cd8727da817a16638218802d460a568dd70502424ba3ccfea44c8e5621a8c9ddb6ed0e7ad92db", 0x50) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r1, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000240)={0x0, 0x6}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) clone(0x10210000, &(0x7f0000000180)="c72776f9149212560147ad1521774f09f7491e772296fa64a36dcee58931fa", &(0x7f00000001c0), &(0x7f0000000200), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:26 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331050000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:26 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000fdfdffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x8da90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf9a70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:26 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x1, 0x7f, 0x3, 0x1a, 0x0, 0x100, 0x41000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000180)}, 0x44240, 0x2c, 0xffffffff, 0x0, 0x7, 0x1000, 0x5, 0x0, 0x800, 0x0, 0x100}, 0x0, 0xd, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1124.696432] IPVS: ftp: loaded support on port[0] = 21 [ 1124.751551] IPVS: ftp: loaded support on port[0] = 21 [ 1124.761177] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x8ea90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:26 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331060000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfa000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:26 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd2800200000030000007fffffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x8fa90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:26 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331070000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1124.824558] cramfs: empty filesystem [ 1125.133033] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1125.164474] cramfs: empty filesystem [ 1125.402879] IPVS: ftp: loaded support on port[0] = 21 10:58:27 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000003c0)={0x9e0000, 0x0, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0xfffffffe}}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[@ANYBLOB="180533f63277b871a46f06c70502fa1b054907fb64005cb87aad7f1f226089084ac52238f5ceae32dde2005d45ee2f2ae34f22e7b15985f99382307e165e366634c347640e331afe9263a84443fd41daf44f7b7f6699bfd58f4f751d2c1fd69f42d816567c36a6ef74a84a5250ab44a531d1682eac007e2814c17f85f28454fcc4905869b79074f1c698a1237cbc1c73c9d554e4eb94f7d7e4e9"]) open(0x0, 0x141042, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) write(r0, &(0x7f0000000280)="f059bd3a3768b38f0029292bb8afe0c50b287ae52438435bc38b76f79285f1251801155c32346ac0dd4cd8727da817a16638218802d460a568dd70502424ba3ccfea44c8e5621a8c9ddb6ed0e7ad92db", 0x50) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r1, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000240)={0x0, 0x6}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) clone(0x10210000, &(0x7f0000000180)="c72776f9149212560147ad1521774f09f7491e772296fa64a36dcee58931fa", &(0x7f00000001c0), &(0x7f0000000200), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfaa70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:27 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd2800200000030000008cffffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x90a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331080000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1125.756573] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331090000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfba70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:27 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000f0ffffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1125.801538] cramfs: empty filesystem [ 1125.905862] IPVS: ftp: loaded support on port[0] = 21 10:58:27 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, 0x0, 0x4800) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)={0x1, 0x0, [0x0]}) madvise(&(0x7f0000a22000/0x4000)=nil, 0x4000, 0x3) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000180)) 10:58:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x91a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310f0000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1126.118671] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfc030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1126.170397] IPVS: ftp: loaded support on port[0] = 21 10:58:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x92a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:28 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000003c0)={0x9e0000, 0x0, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0xfffffffe}}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[@ANYBLOB="180533f63277b871a46f06c70502fa1b054907fb64005cb87aad7f1f226089084ac52238f5ceae32dde2005d45ee2f2ae34f22e7b15985f99382307e165e366634c347640e331afe9263a84443fd41daf44f7b7f6699bfd58f4f751d2c1fd69f42d816567c36a6ef74a84a5250ab44a531d1682eac007e2814c17f85f28454fcc4905869b79074f1c698a1237cbc1c73c9d554e4eb94f7d7e4e9"]) open(0x0, 0x141042, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) write(r0, &(0x7f0000000280)="f059bd3a3768b38f0029292bb8afe0c50b287ae52438435bc38b76f79285f1251801155c32346ac0dd4cd8727da817a16638218802d460a568dd70502424ba3ccfea44c8e5621a8c9ddb6ed0e7ad92db", 0x50) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r1, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000240)={0x0, 0x6}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) clone(0x10210000, &(0x7f0000000180)="c72776f9149212560147ad1521774f09f7491e772296fa64a36dcee58931fa", &(0x7f00000001c0), &(0x7f0000000200), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:28 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000f5ffffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfca70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331100000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1126.174485] cramfs: empty filesystem [ 1126.912196] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1126.990010] cramfs: empty filesystem [ 1127.024331] IPVS: ftp: loaded support on port[0] = 21 10:58:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x93a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:28 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000f6ffffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331140000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1127.155537] IPVS: ftp: loaded support on port[0] = 21 [ 1127.385495] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x94090000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfcffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331230000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:30 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000feffffff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:30 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) r0 = syz_mount_image$befs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="a42c7399c2c4c4e11724c9f06f84b7fe6a512476bd905e8497848d3978c14e416c2c61a73a8f49f2c98f0adbb6ffa15294667a6889d54b41ddfa9e5282e074775723bb85f24b8881ac08eaec8f892fd8f40bca4fe7a084ecf9a2788f184fe577b0a2158064798223711c513b3a38b59a60", 0x71}], 0x2000000, &(0x7f00000002c0)={[{}, {'/+'}, {'e'}, {'+'}, {':.\t%'}, {'\x00'}], [{@euid_eq}]}) fchdir(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:30 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x4c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "d93abf07637f33a5e70d0da71aef5725"}, @NL802154_KEY_ATTR_ID={0x2c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x20, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}]}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x6c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8914, &(0x7f0000000000)={'wpan1\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r3, 0x190, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) 10:58:30 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, 0x0, 0x4800) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)={0x1, 0x0, [0x0]}) madvise(&(0x7f0000a22000/0x4000)=nil, 0x4000, 0x3) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000180)) [ 1127.458129] cramfs: empty filesystem [ 1129.217997] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1129.248157] IPVS: ftp: loaded support on port[0] = 21 10:58:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfda70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331250000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:30 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000096f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x94a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1129.273344] cramfs: empty filesystem [ 1129.523862] IPVS: ftp: loaded support on port[0] = 21 [ 1129.566008] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653315f0000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:31 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000020000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x95a90100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfe030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331c60000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1129.602137] cramfs: empty filesystem [ 1129.847255] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1129.920757] cramfs: empty filesystem [ 1130.098199] IPVS: ftp: loaded support on port[0] = 21 10:58:32 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0xce, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) shmget$private(0x0, 0x2000, 0x54000000, &(0x7f00000ee000/0x2000)=nil) 10:58:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x962598c3, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:32 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000030000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331000300006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfea70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:32 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 1130.624471] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:32 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000040000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfeff0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653319e0300006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x9effffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1130.645391] cramfs: empty filesystem [ 1130.780324] IPVS: ftp: loaded support on port[0] = 21 [ 1130.879601] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:32 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 10:58:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfeffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1130.945259] cramfs: empty filesystem [ 1131.447044] IPVS: ftp: loaded support on port[0] = 21 10:58:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331004100006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:33 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000050000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xb6030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xff0f0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:33 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 10:58:33 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x9, 0x8, 0x6, 0x0, 0x7, 0x80000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f00000003c0), 0x1}, 0x2, 0x689, 0x1, 0xc, 0x7, 0x6, 0x4, 0x0, 0x8, 0x0, 0x1000}, 0xffffffffffffffff, 0xd, r0, 0x7) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getuid() ioprio_get$uid(0x0, r3) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="280000002000000229bd7000fedbdf2502802006e0000008020000000c001400", @ANYRES32=r3, @ANYRES32, @ANYBLOB="35804833992b72240144b2b653b97f0fd8cda3a20686d912ebab32c39b75caeb35600c71f877f34d7585214fbd4f616ec4e3ff1d240f7c6d1223c8fb9571f7d08659fd76d8f9e8ddcd58aa50b8620c6c7c5231620572ddd6916a703a693aa2c30497e055fb02a7afa890fb21702bcdb3dc177d63468f82d6cfe3fa139bcd424a730183f7d9124d6627a26433f02a8735b76718d7090dead2470e731aba597498ef888dd2a4601e38ca26d6fdb2782d68652afafa51581a2f426aab4175e44a5ec4074aa59f4e861affe594"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x1) r4 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x80000001, 0x385000) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f000001d000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="640f18f9b800008ed065660fc773000f20c06635040000000f22c0650f912cbaa100ed66b9800000c00f326635000800000f302ee4a20f0f369d00a4f30faef6", 0x40}], 0x1, 0x40, &(0x7f0000000280)=[@vmwrite={0x8, 0x0, 0x1b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @cstype0={0x4, 0x4}], 0x2) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/block/loop0', 0x0, 0x4996bc5e497851fc) timerfd_gettime(r5, &(0x7f0000000280)) ioctl$VIDIOC_S_CROP(r5, 0x4014563c, &(0x7f0000000580)={0x9, {0x3, 0xfffffff7, 0x0, 0x8}}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) [ 1132.310303] IPVS: ftp: loaded support on port[0] = 21 [ 1132.332628] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xc3982596, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:34 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000060000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331004500006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xff7f0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:34 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 1132.371239] cramfs: empty filesystem [ 1132.614119] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:34 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000070000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xc3ffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffa70100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331005e00006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1132.662158] cramfs: empty filesystem [ 1132.918887] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xc6030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:34 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000080000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1132.964146] cramfs: empty filesystem [ 1133.139744] IPVS: ftp: loaded support on port[0] = 21 [ 1133.296990] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:35 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffff1f00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331008400006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xe4ffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:35 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000090000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:35 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50828, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, @remote, @private0}}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffff7) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x160, &(0x7f0000003380)={0x0, 0x3938700}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local, @private1, @private0, 0x0, 0x0, 0x0, 0x500, 0x8000000006}) 10:58:35 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffa888, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1133.336921] cramfs: empty filesystem [ 1133.747789] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533100d700006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xea020000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:35 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000100000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:35 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffff000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653318adcdf726076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf0ffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:35 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000180000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1133.809928] cramfs: empty filesystem [ 1134.085383] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffff7f, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1134.097162] cramfs: empty filesystem [ 1134.276911] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:36 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000230000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:36 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf2020000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffff9e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533190dcdf726076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:36 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeec, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) fadvise64(r0, 0x7ffd, 0x800020000000, 0x5) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f000015c000/0x4000)=nil, 0x4000, 0xa) 10:58:36 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1134.321768] cramfs: empty filesystem [ 1134.672002] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1134.705330] IPVS: ftp: loaded support on port[0] = 21 10:58:36 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331d9dcdf726076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf2030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffffc3, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:36 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000600000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:36 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1134.798448] cramfs: empty filesystem [ 1135.000241] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:36 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000300436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331dfdcdf726076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffffe4, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xf4030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1135.068038] cramfs: empty filesystem [ 1135.363027] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1135.413876] cramfs: empty filesystem [ 1135.493509] IPVS: ftp: loaded support on port[0] = 21 10:58:37 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653311fffffff6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffffff0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:37 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000500436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfa000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1135.808770] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffffffc, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:37 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000600436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000002076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffffffe, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfc030000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:37 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1135.840401] cramfs: empty filesystem [ 1136.097775] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1136.097775] [ 1136.111963] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:37 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000700436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfcffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1136.151276] cramfs: empty filesystem [ 1136.216675] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1136.216675] 10:58:37 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010200006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:38 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1136.428917] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfeff0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000900436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:38 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfeffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010300006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 1136.470599] cramfs: empty filesystem [ 1136.711024] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xff0f0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000001800436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010400006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xff7f0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1136.815886] cramfs: empty filesystem [ 1137.023775] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x5, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010500006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:38 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000002000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:38 executing program 1: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffff1f00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010600006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:38 executing program 1: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1137.052700] cramfs: empty filesystem [ 1137.337224] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:39 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000002300436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:39 executing program 1: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffa888, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010700006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1137.453291] cramfs: empty filesystem [ 1137.640458] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:39 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffff000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010800006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:39 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000003f00436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1137.729902] cramfs: empty filesystem [ 1137.878813] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:39 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:39 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000004000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x9, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010900006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffff7f, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1137.930934] cramfs: empty filesystem [ 1138.162833] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010b00006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:39 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000006000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xa, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffff9e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:39 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010f00006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xc, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1138.209225] cramfs: empty filesystem [ 1138.433130] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:40 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd280020000003000000000fff00436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffffc3, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:40 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331011000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffffe4, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1138.495182] cramfs: empty filesystem [ 1138.674491] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:40 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000ff6f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:40 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffffff0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331012300006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1138.717281] cramfs: empty filesystem [ 1138.909310] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:40 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:40 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000200436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x10, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffffffc, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:40 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331016000006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:40 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000300436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1138.971000] cramfs: empty filesystem [ 1139.208400] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:40 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x12, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010003006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xfffffffe, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1139.225875] cramfs: empty filesystem [ 1139.451687] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0xffffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000400436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010005006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:41 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x48, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 1139.504185] cramfs: empty filesystem [ 1139.752057] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:41 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000500436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010006006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010007006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1139.818295] cramfs: empty filesystem [ 1140.000156] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000600436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:41 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010009006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1140.071175] cramfs: empty filesystem [ 1140.244750] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x60, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:42 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000700436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:42 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000b006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x5, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x68, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1140.314506] cramfs: empty filesystem [ 1140.565209] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:42 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:42 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000800436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:42 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000f006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:42 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010020006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1140.616413] cramfs: empty filesystem [ 1140.916897] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:42 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) 10:58:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x74, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:42 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000900436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:42 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) 10:58:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010023006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1141.007802] cramfs: empty filesystem [ 1141.247574] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:42 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) 10:58:43 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000001000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101003f006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x9, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 1141.322573] cramfs: empty filesystem [ 1141.538448] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:43 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 10:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xa, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfa, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000001800436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010040006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:43 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 10:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xc, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x11c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 1141.660195] cramfs: empty filesystem [ 1141.884624] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:43 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000002300436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010060006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 10:58:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x154, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1141.939600] cramfs: empty filesystem [ 1142.196412] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:43 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 10:58:43 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000006000436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010fff006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:44 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x182, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1142.208591] cramfs: empty filesystem [ 1142.414319] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x10, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:44 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000003436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000b476000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:44 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x18a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1142.507823] cramfs: empty filesystem [ 1142.677247] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1142.677247] 10:58:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x12, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1142.759057] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:44 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:44 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000005436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1142.794323] cramfs: empty filesystem [ 1142.833905] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1142.833905] 10:58:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2ea, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:44 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 10:58:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000c676000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2f2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1143.011606] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:44 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000006436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x300, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x48, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1143.107971] cramfs: empty filesystem [ 1143.241761] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1143.241761] 10:58:44 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 10:58:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010002006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1143.315390] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:45 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000007436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x34a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 1143.369527] cramfs: empty filesystem [ 1143.595192] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x37a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010003006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:45 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000009436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3c4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010004006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1143.651866] cramfs: empty filesystem [ 1143.898652] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x60, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:45 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000018436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3c6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x68, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:45 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010005006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1143.945375] cramfs: empty filesystem [ 1144.204496] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:45 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000020436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3e0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010006006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:46 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) [ 1144.237627] cramfs: empty filesystem [ 1144.498816] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:46 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000023436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3f2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) 10:58:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x74, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010007006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:46 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) [ 1144.561824] cramfs: empty filesystem [ 1144.747468] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3f4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd2800200000030000000000003f436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010008006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3fc, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1144.793532] cramfs: empty filesystem [ 1144.989281] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x86, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000040436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010009006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3fe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1145.032843] cramfs: empty filesystem [ 1145.271568] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:46 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x500, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000060436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000b006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfa, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1145.318186] cramfs: empty filesystem [ 1145.575270] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x600, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000f006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:47 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000fff436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x110, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 1: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x700, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1145.629342] cramfs: empty filesystem [ 1145.864486] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x11c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010010006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:47 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000096f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7f4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653311fffffff6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:47 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeec, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) fadvise64(r0, 0x7ffd, 0x800020000000, 0x5) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f000015c000/0x4000)=nil, 0x4000, 0xa) 10:58:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x142, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x900, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010023006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1145.947042] cramfs: empty filesystem [ 1146.304553] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x154, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:48 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000002436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:48 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa04}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f100)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "b67d5166ab9c79"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f000005a600)={{0x0, 0x400, 0x46, 0x9, 0xff, 0xfff, 0x80000001, 0xff, 0x7, 0x18, 0x1, 0x3d0c, 0x7ff, 0x0, 0x4}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005b600)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b800)={0x401, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {r5}], 0x81, "04381a1d4755de"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005af00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r6}], 0xff, "17a71eb7b9fc5b"}) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/block/loop0', 0x0, 0x4996bc5e497851fc) timerfd_gettime(r9, &(0x7f0000000280)) ioctl$SIOCX25CALLACCPTAPPRV(r9, 0x89e8) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r10 = open(0x0, 0x141042, 0x0) r11 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r11, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000180)) write$P9_RREADLINK(r10, &(0x7f00000003c0)=ANY=[@ANYBLOB="10200000000095cf1a38000001006530ee922b53db9b78e9167675c7068eba136ef2256322595be6f4086a4519c8b42da4c4ceb77025"], 0x10) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1146.364586] cramfs: empty filesystem [ 1146.449982] IPVS: ftp: loaded support on port[0] = 21 10:58:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xa00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010060006076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x18a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1146.706716] IPVS: ftp: loaded support on port[0] = 21 [ 1146.729254] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:48 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000003436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000036076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1146.788418] cramfs: empty filesystem [ 1147.121801] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1147.166057] cramfs: empty filesystem [ 1147.433669] IPVS: ftp: loaded support on port[0] = 21 10:58:51 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xc00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2ea, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000056076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:51 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000004436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:51 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000180)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000066076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2f2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1150.140929] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xe00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:51 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000005436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1150.192614] cramfs: empty filesystem [ 1150.209453] IPVS: ftp: loaded support on port[0] = 21 10:58:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000076076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x300, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1150.418587] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:52 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:52 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000006436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000096076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x340, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1150.458069] cramfs: empty filesystem [ 1150.704332] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1150.739752] cramfs: empty filesystem [ 1150.917895] IPVS: ftp: loaded support on port[0] = 21 10:58:52 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) unshare(0x40000800) r0 = syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x3b2e, 0x2, &(0x7f0000000440)=[{&(0x7f0000000300)="8fdb53214dcce841b76134662b80abda2a3f409a65913cf87b189d8e1e8afbc583be7630b8982db4c292789f32f99827b31694d570e06d58053bfa9396ee9dbcdb59002c1ad36d1ce90e6628627797fe82a7f1c6db6462c7a2b3fceb7447988eedada1dc613da13bbb4ebc178cc95bd4f6ca1cf43467cca053742e398393d86334134603baa7fb3d8432fce8484498e289b18b3663ddb36069baaf0cfa279140ba0baf63e4cb273742614063315fff2000d1958e1ec81e880635c52101bdc943abcc6f77127bb91b6f8c30f42edfb7e9", 0xd0, 0x5}, {&(0x7f0000000400), 0x0, 0xbc54}], 0x8010, &(0x7f0000000480)={[{@block={'block', 0x3d, 0x800}}, {@nocompress}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_user={'obj_user', 0x3d, ',))\\#,$[[.)%!\\'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@subj_role={'subj_role', 0x3d, '/dev/uhid\x00'}}, {@pcr={'pcr', 0x3d, 0x35}}]}) signalfd(r0, &(0x7f0000000540)={[0x488]}, 0x8) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x0, 0x7, 0x0, 0x6222886f, 0x1040, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x5}, 0x18008, 0x7, 0x3ff, 0x9, 0x7, 0x3f, 0xfffe, 0x0, 0x6, 0x0, 0x1ff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) 10:58:52 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000007436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1200, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:52 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000b6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x34a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1151.461421] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1151.472908] IPVS: ftp: loaded support on port[0] = 21 10:58:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000f6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3b6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1c01, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:53 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000008436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3c6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1151.520023] cramfs: empty filesystem [ 1151.756355] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000206076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1151.876496] cramfs: empty filesystem [ 1152.181558] IPVS: ftp: loaded support on port[0] = 21 10:58:54 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000180)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, 0xfffffffffffffffa) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:58:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1f00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:54 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000009436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:54 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:58:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3f2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000236076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:54 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 1153.036046] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100003f6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3f4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:54 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000018436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1153.094685] cramfs: empty filesystem [ 1153.203115] IPVS: ftp: loaded support on port[0] = 21 10:58:54 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 1153.404730] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1153.483580] cramfs: empty filesystem [ 1153.847992] IPVS: ftp: loaded support on port[0] = 21 10:58:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000406076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3fc, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3c00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:55 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000023436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:55 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:55 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r1, 0x0, 0x4800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f00008aa000/0x3000)=nil, &(0x7f00008d6000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000201000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000a37000/0x3000)=nil, &(0x7f000094e000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000104000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)="1c16e0d777479ab0b3a8a60a9d85fb1dadc31262a16dd68117a44ec0142d3791adcf6aa84f09d759eb08fb722fe775047d01f92e298331fd770c04a5a3529ca6a06ed641b7d7365c14c067bc5aa97c893ae531f2b774706891f6aa9010cf21a373ab5aeb34a5658f1a03a2400790c9af5a693d1f185d8f68d9aed12151dc1010d7c470d8d5dd5980844743a0e2d5b98f09f95594aeda9ecf47a3a528400c1e518d09ab60dc7435eb4ab3b3b16d857b4919b7a7e4546a35c25348babb01f2c4d7c7bc3f009ca983b61896ec7b63ecef7ab0c37cb9e91c33c1", 0xd8, r0}, 0x68) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f00000001c0)=0x4, 0x4) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r2, 0x0, 0x4800) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000001ac0)={0x30, r4, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x1c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth0_to_batadv\x00'}}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x258, r4, 0x3, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x190, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "1b2eda7efaf3837cff5d4544b13db9ddfe2d0c11503a31e5c0bde7df3fbd74b91486ac"}}, @TIPC_NLA_NODE_ID={0x8e, 0x3, "6561a8319762af50f05c4eeee709449cddce20c03dc296744090b8bb5e784ab008d70502424ac8b99391868a6d8a9ec108c2c2c6435fa28f21a14a8c4909ad324696013636dd021b3720d1094d3e06de35d3d2b19cc34af626f3fd87b8925353011dbeb26064e13e5f85278f91c990994d225e08e33f779c109a4605906b82ee938468bb3b509c2d70c0"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "3fff9d1c0f4b616bc7cc0996c4194cfdac46aa0a55d3eabf71734b0b034eb0ca53"}}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "e21e19a0ddd70d9a14f4812dcd13a2933327757aa55a0e8cf1f081a723c3e08673"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7b2dae41}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdff}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x4004011}, 0x4044) [ 1154.251518] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:55 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 1154.275579] cramfs: empty filesystem [ 1154.310019] IPVS: ftp: loaded support on port[0] = 21 10:58:55 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000060436f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x500, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000606076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3f00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:56 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x600, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1154.594129] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:56 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000fff6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:56 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000ff6f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1154.619606] cramfs: empty filesystem [ 1154.899338] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1154.990245] cramfs: empty filesystem [ 1155.230377] IPVS: ftp: loaded support on port[0] = 21 10:58:57 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = creat(0x0, 0x3) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c653020cdd9b352b4a0f76f65e06efdaab05fc7bc450ea977001e511ceac27c7105f8e29e23e58c507b87423a7b18791a9e110b961d6df0bd8999"], 0x191) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 10:58:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x700, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:57 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:58:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000002076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4800, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:57 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000096f6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:57 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1155.641600] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1155.641600] [ 1155.644591] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:57 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000430a6d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1155.691449] cramfs: empty filesystem [ 1155.713467] IPVS: ftp: loaded support on port[0] = 21 10:58:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4a00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000004076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x900, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:57 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1155.960028] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1155.963814] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1155.963814] [ 1156.007927] cramfs: empty filesystem [ 1156.155779] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1156.155779] [ 1156.494747] IPVS: ftp: loaded support on port[0] = 21 10:58:58 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:58:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4a03, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:58 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd2800200000030000000000000043256d7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x994, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000026076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:58 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000300)={0x0, 0x0, 0x10002, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9909df, 0x7fff, '\x00', @p_u16=&(0x7f00000002c0)=0xffff}}) r1 = open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r2, 0x0, 0x0) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r4, 0x0, 0x0) ppoll(&(0x7f0000000180)=[{r2, 0x100}, {r0, 0x211c}, {r1, 0x4080}, {r3, 0x2018}, {r0, 0x284}, {r1, 0x2}, {r0, 0x2000}, {r0, 0x1002}, {r4, 0x400}, {r1, 0xa0}], 0xa, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)={[0xec85]}, 0x8) 10:58:58 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 1156.978167] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000036076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4c00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xa00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:58 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f0a7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1156.992844] cramfs: empty filesystem [ 1157.079815] IPVS: ftp: loaded support on port[0] = 21 10:58:58 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 1157.266940] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:58:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000046076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:58:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xc00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x5401, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:58:59 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f257072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:58:59 executing program 1: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1157.302031] cramfs: empty filesystem [ 1157.656356] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1157.704693] cramfs: empty filesystem [ 1157.787884] IPVS: ftp: loaded support on port[0] = 21 10:59:00 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) preadv(r0, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x4, 0x4) mremap(&(0x7f0000538000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000b21000/0x3000)=nil) 10:59:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xe00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x5865, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000056076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:00 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d0a72657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:00 executing program 1: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1158.591938] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:00 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d2372657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:00 executing program 1: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000066076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1158.618822] cramfs: empty filesystem [ 1158.833284] IPVS: ftp: loaded support on port[0] = 21 10:59:00 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1158.895266] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1158.939780] cramfs: empty filesystem [ 1159.472264] IPVS: ftp: loaded support on port[0] = 21 10:59:01 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x72000a00) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:01 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d2572657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6088, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1001, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000076076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:01 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1160.248101] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:01 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d2a72657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000086076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:02 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1200, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6558, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1160.273024] cramfs: empty filesystem [ 1160.428552] IPVS: ftp: loaded support on port[0] = 21 [ 1160.566646] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:02 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1160.636447] cramfs: empty filesystem [ 1161.186265] IPVS: ftp: loaded support on port[0] = 21 10:59:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1c01, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6800, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d2b72657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000096076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:03 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:03 executing program 0: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xd) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r2 = open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x9318, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000240)=0x9) ppoll(&(0x7f0000000180)=[{r2, 0x2038}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) 10:59:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d2d72657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1162.024813] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6c00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1162.036054] cramfs: empty filesystem [ 1162.140290] IPVS: ftp: loaded support on port[0] = 21 10:59:03 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1f00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1162.253622] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d2e72657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000b6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:03 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7400, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x2000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000f6076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1162.263001] cramfs: empty filesystem [ 1162.547927] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7a00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1162.609442] cramfs: empty filesystem [ 1162.901079] IPVS: ftp: loaded support on port[0] = 21 10:59:05 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc0020000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="4fb556e3870de3273efccaca344f50824c3baf5dc843418fc44e9dce6f95939c2b445e7d8f1419fc6fedc57b868a4a1a7c88c1d0516404e6c295b874f891d7c1b59c14e2568c3362dff32ad955954f7b4c6bbe6a76611a7979ab7f70682e77f5e54ebee4fec4f6a005cf9b9780a35ee62102c3c6ef0dacbe91b94c997ed0a44c57e2ab3d1cf6ff780a899eae75880feaef0a62bdfd847dfd06f0bca383") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:05 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:05 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d3072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3c00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000106076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7a03, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x3f00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8100, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:05 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000236076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1163.790794] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1163.841726] cramfs: empty filesystem [ 1163.856318] IPVS: ftp: loaded support on port[0] = 21 10:59:05 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d5872657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1163.942891] IPVS: ftp: loaded support on port[0] = 21 10:59:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000606076000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1164.188591] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:06 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x400000, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x1, 0x6, 0x2, 0x7, 0x0, 0x3f, 0x40200, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x4, 0x0, 0x6, 0x3, 0x7fffffff, 0xce29, 0x0, 0x100, 0x0, 0x100}, 0xffffffffffffffff, 0x10, r0, 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:06 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:59:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8201, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:06 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d6372657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000b476000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1164.212715] cramfs: empty filesystem [ 1164.665869] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1164.665869] [ 1164.667464] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000c676000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8a01, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:06 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 1164.842957] IPVS: ftp: loaded support on port[0] = 21 10:59:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4003, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:06 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d6472657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1164.900069] cramfs: empty filesystem [ 1164.926921] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1164.926921] 10:59:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4201, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1165.081936] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1165.081936] [ 1165.133325] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1165.185270] cramfs: empty filesystem [ 1165.481625] IPVS: ftp: loaded support on port[0] = 21 10:59:07 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x3300c1, 0x308) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000001c0)) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xc403, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:07 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:59:07 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d6972657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000b476000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4800, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1165.800111] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1165.831057] cramfs: empty filesystem [ 1165.844478] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1165.844478] 10:59:07 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:07 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d6c72657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4a00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xc603, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1165.939586] IPVS: ftp: loaded support on port[0] = 21 [ 1166.029608] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1166.029608] 10:59:07 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4a03, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1166.147879] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1166.176056] cramfs: empty filesystem [ 1166.672392] IPVS: ftp: loaded support on port[0] = 21 10:59:08 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) unshare(0x100) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xe003, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000c676000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:08 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d6f72657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x4c00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:08 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1167.199354] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1167.199354] [ 1167.225955] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000600a000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:08 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7372657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1167.259112] cramfs: empty filesystem [ 1167.311114] IPVS: ftp: loaded support on port[0] = 21 10:59:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x5401, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:09 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:59:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xea02, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1167.490451] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1167.490451] [ 1167.505266] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:09 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 1167.543890] cramfs: empty filesystem [ 1167.557965] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1167.557965] [ 1168.079403] IPVS: ftp: loaded support on port[0] = 21 10:59:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x5865, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:10 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7572657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006025000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:10 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 10:59:10 executing program 0: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000001380)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$tty1(0xc, 0x4, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000001600), 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000001640)=ANY=[@ANYBLOB="0500000000000000000fe67b5e77341bd70000943cf76d0000000000"]) write$tcp_congestion(r1, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f00000001c0)={{r0}, "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"}) clone(0x9000000, &(0x7f00000011c0)="b357167ba96261bc84f76e6ae729b280b895e5266baad6820c2c949acae02f4c82f03e5fcf84bfda9b655875c7aab72dcb4f27f3e0b790fa3f2dae626bb576b22d822e7a98907148e9b51466e5c109b6dc78322450d59aa096071007a2ba6826fbc45568c680a5bb380196893de85bac8257ed8c0ba42a5a66f072b0b5e4d025b35847e6192ad5205436982f7f5bf347", &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001300)="28cc88318d9916dbee1586ab2948f5ce1f2d173dae56bc30f2ed81fd3fb65f0aade1666572701041d2fe6ac7446b89b59ab15ccff420ffab342248d80874628dc8a9f9301704534215b22c5fdeeb6381d50e175e1dd430dcbe0c78cbec9b14c71b64c8fd7fae02") ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r3 = open(0x0, 0x141042, 0x0) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) clone(0x80004000, &(0x7f00000013c0)="b7c8497c79373025202773ecc38ee16e542c2600bcd56ca12aa38556178e6046d4fae1faa98eec4cc84f528fc4d57b9d405c19469c1ac6e5ef5cd0f228a76aa0cfc4d3bb0f7bb1c22422ddff1854c65f0b235812b64ed10687cd59277a2c288764f651d8c8a9563d7716cc8b3e08721482d5ac2f013773e24c7ac859df751963fa665054bd40ad1f2974459f6df8c939c32c751c3e997f871da23b63fdfe893afae17802eb222bdd6ac9c86cd2361211368a035919dc52215e77e94155c7f224a777e7175733ca2cd77f564c39de226e07b19ec374341e8f83131b2b", &(0x7f00000000c0), &(0x7f00000014c0), &(0x7f0000001500)="4d41cd23fbc1dd0b052511a9558c790aabfeebbf47dc2fe126077a58b2b0ae0c2d689473259ecaf8ff59ccf9b27faebed9517f8fbf5f7817b50be0435d267222ab42a2a91f3628262111f03e4040e1ff6adf086653646e59f4e3ec59a504c81f309a791621daa08154b546b9d35e986c1eebc69bc70bac0251d13f6bcdcb788d8d51d2aa47c019ef3ce2c00d3c36de64dc2975299e44f6d37f26d32df8709810472a15f581dd2f1b4d105197c8d0c6e55153dd5f626a088519e6f65551c8eeec1b735b36696e9fdc543b6ae258f2d0e8ce4a366a14efb40ef863df47c04b98bc5fd3f82738096a5f0dce") write$tcp_congestion(r4, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r4, 0x4106}, {r3, 0x4a4}], 0x2, 0x0, &(0x7f0000000180)={[0x8]}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1168.491165] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:10 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) [ 1168.525823] cramfs: empty filesystem [ 1168.533391] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1168.533391] 10:59:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:10 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7872657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf202, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:10 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) [ 1168.711260] IPVS: ftp: loaded support on port[0] = 21 10:59:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060c6000000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6088, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:10 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) [ 1168.914534] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1168.931220] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1168.931220] 10:59:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf203, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:10 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7025657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6558, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1168.997268] cramfs: empty filesystem [ 1169.150366] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1169.150366] [ 1169.324510] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1169.359000] cramfs: empty filesystem [ 1169.618984] IPVS: ftp: loaded support on port[0] = 21 10:59:11 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = open(0x0, 0x141042, 0x0) r1 = accept$nfc_llcp(r0, 0x0, &(0x7f0000000180)) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f00000001c0)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:11 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 10:59:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf403, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000100000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:11 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d70720a7373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6800, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1170.165472] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x6c00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:11 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 1170.220664] IPVS: ftp: loaded support on port[0] = 21 10:59:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000600000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf407, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:11 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072257373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:12 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 1170.253754] cramfs: empty filesystem [ 1170.556686] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1170.576403] cramfs: empty filesystem [ 1170.979413] IPVS: ftp: loaded support on port[0] = 21 10:59:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000b00000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7400, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfa00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:12 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072652373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:12 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000180)={0x1f, 0x0, '\x00', {0x0, @bt={0x8, 0x7, 0x0, 0x2, 0x2, 0x3, 0x80, 0xecf, 0x0, 0x59, 0x916, 0x9, 0x1, 0x0, 0x1, 0x0, {0x0, 0xcbbe}, 0xfc, 0x3f}}}) clone(0x880, &(0x7f0000000240)="2b6219ff4b1cb1d311452e2aaa076ff66c357bb5970ae056c639a713e0c05267cada83a2e7bad4ce6e698fd4309b1b55e42767ad1b8cabafda723aec86d0243ea5d7e95c5f5745a1b9aa685ac1f897031d99da311a603272bb35f5adc685c91084d68edcae66cf3e43dd42af3dbfb7b36b774050fe493b66a1611020b025bb60e61fc5e8399f7078ab95b306e272ee", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="a5832fd2c5f4a777ab8b0b752885558b29dc7970d703d2c105aac6c0fd265c312d6c949b9ccbd7faab9ad849fdbdb5e22c5e8a6eefb3352b255e4303e2e05681f2f4bf5ecbe756382cde40100ccd65d13a8f4e8274b84d3d26688343002912688fad71b5e08ea3a4e80a5ce8224132fa0d589bd5bf7680a82a64be27e1fca285cc16953e616317d9726a21") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:12 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 10:59:13 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 1171.405824] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:13 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072652573656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000c00000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x7a00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1171.433486] cramfs: empty filesystem [ 1171.550900] IPVS: ftp: loaded support on port[0] = 21 10:59:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfc03, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:13 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 10:59:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8100, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1171.767270] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:13 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000d00000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:13 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072652a73656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1171.841956] cramfs: empty filesystem [ 1172.124417] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1172.183230] cramfs: empty filesystem [ 1172.384458] IPVS: ftp: loaded support on port[0] = 21 10:59:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076020000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfe03, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:14 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8600, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:14 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) unshare(0x0) 10:59:14 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072652b73656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:14 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1172.845608] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1172.853461] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1172.853461] 10:59:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfeff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x8a01, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:14 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072652d73656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1172.890692] cramfs: empty filesystem [ 1172.960322] IPVS: ftp: loaded support on port[0] = 21 10:59:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076030000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:14 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 1173.140021] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1173.140021] [ 1173.165584] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xff0f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:14 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072652e73656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1173.213444] cramfs: empty filesystem [ 1173.280473] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1173.280473] 10:59:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x9409, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:14 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 1173.451404] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1173.496904] cramfs: empty filesystem [ 1173.687654] IPVS: ftp: loaded support on port[0] = 21 10:59:16 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072653073656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076040000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xff7f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:16 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 10:59:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xb603, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:16 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100080, &(0x7f0000000380)="ef71bef15c55ded4c64844f774d7c18909c3b2e59c30fd4bf5db575a3108460ea361ae40bddb5722e32e7200de8cdd4b0d92a8ac7280040c718b195a60fb5777eb58b0a6332604a8d40e9bc76a63f855e7194c20141d04b28c8a9d9071c86ef52deb0605039b0e3e28e7383f446298d088bb2d044904fd249332e5aa39b8e6502c227e24adcc0ae663421ee8b68e1923bc345e882e61cbef260eac10196ed8309b1ea2fe0e0f09cc004a5dfd8353376fa585f9584496e9bf879452d255160417118742fb78c503f73835d5ccfbad3166e09643ab720d2a26a87acb924b1092573a387bc59bc63dca810bd13be2b9b99ed063", &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="7e86ede770") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, r0, 0x0, &(0x7f0000000000)={0x9a0914, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) r1 = syz_mount_image$erofs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x9, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000200)="ce3eae284532bc2d069ec4309773585804bd8a0d311b40066c60c1b53ad808e8b5d69cfaff8c9e17d56ae8462916c0391db299b3be5d4dcfa73325c5574caad68653f3172ca6c4c7bc2c15c8ed4c89100387831c5dedc6869702645146199732fea949309553596e643f565b9e55bff95eb348ed960e94654832893502a0c2ac1832e49d59815e8060898ab3", 0x8c, 0xbcc0}], 0x800000, &(0x7f0000000300)=ANY=[@ANYBLOB='noacl,user_xattr,user_xattr,fault_injection=0x0000000000000004,noacl,uid=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) ppoll(&(0x7f0000000040)=[{r1, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0)={[0x81]}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1174.517685] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1174.517685] [ 1174.548190] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:16 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:59:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfffe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xc603, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:16 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072655873656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1174.591012] cramfs: empty filesystem [ 1174.684333] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1174.684333] [ 1174.708500] IPVS: ftp: loaded support on port[0] = 21 10:59:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076050000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:16 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:59:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a78a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xea02, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1174.968205] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1175.001133] cramfs: empty filesystem [ 1175.007061] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1175.007061] 10:59:16 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072656373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:16 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 1175.224481] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1175.224481] 10:59:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a78b, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1175.672807] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076060000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a78c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:17 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) 10:59:17 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:17 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072656473656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1175.710488] cramfs: empty filesystem [ 1176.005775] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1176.020271] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1176.020271] [ 1176.036881] IPVS: ftp: loaded support on port[0] = 21 10:59:17 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) 10:59:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a78d, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf202, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076070000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:17 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072656973656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1176.097774] cramfs: empty filesystem [ 1176.304748] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1176.304748] 10:59:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf203, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:18 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) [ 1176.395772] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1176.395772] 10:59:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a78e, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:18 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076080000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1176.521976] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xf403, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1176.572640] cramfs: empty filesystem [ 1176.739881] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1176.739881] [ 1176.831270] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1176.831270] [ 1176.861975] IPVS: ftp: loaded support on port[0] = 21 10:59:18 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x88840100, &(0x7f0000000180)="9e5d0068b0ae95e804b8ca71d83903f5603e26f5e256dd0774b14114d13a3e03b7265d2492d663c72022091fddf35c8af2d1e10df06b741357cae6aebc202462ea21cc2b19d2cf1f8f1cf614c2066ab3a5fd", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="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") perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:18 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072656c73656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076070000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a78f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfa00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:18 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076090000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1177.386594] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1177.386594] [ 1177.409934] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:19 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000001380)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$tty1(0xc, 0x4, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000001600), 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000001640)=ANY=[@ANYBLOB="0500000000000000000fe67b5e77341bd70000943cf76d0000000000"]) write$tcp_congestion(r1, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f00000001c0)={{r0}, "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"}) clone(0x9000000, &(0x7f00000011c0)="b357167ba96261bc84f76e6ae729b280b895e5266baad6820c2c949acae02f4c82f03e5fcf84bfda9b655875c7aab72dcb4f27f3e0b790fa3f2dae626bb576b22d822e7a98907148e9b51466e5c109b6dc78322450d59aa096071007a2ba6826fbc45568c680a5bb380196893de85bac8257ed8c0ba42a5a66f072b0b5e4d025b35847e6192ad5205436982f7f5bf347", &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001300)="28cc88318d9916dbee1586ab2948f5ce1f2d173dae56bc30f2ed81fd3fb65f0aade1666572701041d2fe6ac7446b89b59ab15ccff420ffab342248d80874628dc8a9f9301704534215b22c5fdeeb6381d50e175e1dd430dcbe0c78cbec9b14c71b64c8fd7fae02") ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r3 = open(0x0, 0x141042, 0x0) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) clone(0x80004000, &(0x7f00000013c0)="b7c8497c79373025202773ecc38ee16e542c2600bcd56ca12aa38556178e6046d4fae1faa98eec4cc84f528fc4d57b9d405c19469c1ac6e5ef5cd0f228a76aa0cfc4d3bb0f7bb1c22422ddff1854c65f0b235812b64ed10687cd59277a2c288764f651d8c8a9563d7716cc8b3e08721482d5ac2f013773e24c7ac859df751963fa665054bd40ad1f2974459f6df8c939c32c751c3e997f871da23b63fdfe893afae17802eb222bdd6ac9c86cd2361211368a035919dc52215e77e94155c7f224a777e7175733ca2cd77f564c39de226e07b19ec374341e8f83131b2b", &(0x7f00000000c0), &(0x7f00000014c0), &(0x7f0000001500)="4d41cd23fbc1dd0b052511a9558c790aabfeebbf47dc2fe126077a58b2b0ae0c2d689473259ecaf8ff59ccf9b27faebed9517f8fbf5f7817b50be0435d267222ab42a2a91f3628262111f03e4040e1ff6adf086653646e59f4e3ec59a504c81f309a791621daa08154b546b9d35e986c1eebc69bc70bac0251d13f6bcdcb788d8d51d2aa47c019ef3ce2c00d3c36de64dc2975299e44f6d37f26d32df8709810472a15f581dd2f1b4d105197c8d0c6e55153dd5f626a088519e6f65551c8eeec1b735b36696e9fdc543b6ae258f2d0e8ce4a366a14efb40ef863df47c04b98bc5fd3f82738096a5f0dce") write$tcp_congestion(r4, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r4, 0x4106}, {r3, 0x4a4}], 0x2, 0x0, &(0x7f0000000180)={[0x8]}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:19 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072656f73656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfc03, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a790, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1177.435528] cramfs: empty filesystem [ 1177.554037] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1177.554037] [ 1177.566583] IPVS: ftp: loaded support on port[0] = 21 10:59:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760b0000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1177.752167] IPVS: ftp: loaded support on port[0] = 21 [ 1177.770750] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1177.770750] 10:59:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfeff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1177.839922] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1177.903039] cramfs: empty filesystem [ 1177.940800] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1177.940800] [ 1178.387495] IPVS: ftp: loaded support on port[0] = 21 [ 1178.545413] ieee802154 phy0 wpan0: encryption failed: -22 [ 1178.551072] ieee802154 phy1 wpan1: encryption failed: -22 10:59:20 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x9423, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = syz_open_dev$mouse(&(0x7f0000000180), 0x7, 0x1) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r1, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000240)={0x60000, 0x5, 0x1, r1, 0x0, &(0x7f0000000200)={0x98090f, 0x6828a20e, '\x00', @p_u8=&(0x7f00000001c0)=0xb0}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$INCFS_IOC_FILL_BLOCKS(r2, 0x80106720, &(0x7f0000001680)={0x5, &(0x7f00000015c0)=[{0x8, 0xfb, &(0x7f00000016c0)="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", 0x0, 0x1}, {0x5d8de557, 0x1000, &(0x7f0000000380)="adbe2d528e09f59df9f8fc0e7c45f21dd02164532c37b1bdd0b82d9c099714056c8a816025bf8de90f2c13a496b4666980e035d0352b55d56124152ee79fe24037d8e2b70fadf04e074984341fe06ff818a1dc922e6dae14d25fa6c17c2092017db3cb1b4ed1a34e2f02a0115d95bdaa1a9bedaa476d0890c44c4fc26e42cbdd3008a89b4be81df0f675fdde2daa059ed1afef3c879d05c519a884db324599d8e8f488d37b0fcbd9f908ac41b42b837f4bd0b44ab8953740fdd30ef07b09c6709fd73c976c5543d419ec9ccf589088aee9543af06de43b0bcd75f0c9fe6b0b75b7466b56ba35c90af36481aee8ebb5d2b42c9b7b9ce33cab1a482546f104f71e1c3f69190dbca17fcb0216275058069c74240158c9b19f2e263041a25cfd359c5dd11eda040783c7d8280c9880e4089994843702d80d57a34dd89b0b51d17577342c177bee0c5e7776b9addada332eaa3b5b5ea36d03261439afa4ee8107f81603aaf8620a76edf3760ef5d66f2a54d02a7765125faae89d877ea110a12be4946c95bb2eeb95c1fc9600cdea4145560cd91da7221e207a0a76c4b674e866966ee38e1fe9f7d3225cd371b324910c3a67fc0a7fe87049d3d1fd7e02d73df0b750c81ab12da34b5d910660674118565653566344775f4f050f7d72d572f3a3d5b5df78d40f79dc5904febfe4488227e87b49e1e0fa756b0afec0a0419bfe9ec1f393bbf0542a3744e45525733e71b78688b6994a82e55a7a8641eb882fed248e9af2a0f20475203f618601bb313646b75681ef2acca3382fd04af0e5fb213976ab8b3531d62c15b6ceace20278501cf2d7e6cb411e9c76633b2b5bf90bb0c76edb6969adecad62a01f0c35be21347324c83867fe2499bb33bdaca3abff6e832fc15aabd88ad2ec94f7c99b2237c507956574a265f15a406b2321ac2eb58a24868ee5bcd4b6cf0f6e8253fbf9d654585eae0fc0214e57a5e7f4bc7a322f45240db81bc726ceb9149803d39e8f5f6dfa9ad1ecb6c4f99babdc22de5623d583e334865bfefe905f7c40fc857a50021cf942a664cfb45bad7ea273ac829b178e1c00d070d2b55c09414404076de1f5c7811d0cc34806a8e9627841b86316ef4738282660f331b7d8282e9472ddbbe0c075d378ee2d905fe9b02c0cd677cab99d41bb6e9dec45e4016c422235cb9fcee7d70c2bd826b0cdb968c0d117d128f37d483a0f164fe54eda3df62e3d41834a63b764e2ff6ac1779e4d91c7504dd81a1e6910819a5642032b1c820ce6b83c2be3761dc34692aeb0982990e1d065a673093a7fc9918c1d54feb8b8e2ddce8609e9b8cec1e9435f41b9f523a832f7ea7add4d6f615908222bc444995d03b150a2599af5383081da8578a2b2208174ae318b528e0767a8e5af8e5da87223ac41641bdaf00da302201cb0da86b7c13cee3868b267263584b8ab2ecfdb75e560a72c23c983fcdbf0bb25a5dd13428309451ee67fd2e6267476a9f447f47ea21fa42e459e8b7f89a56a9007de38ac06484faf83952ab2f0c33d0a3c42b52bccbbc04de185bd05507de6bb500c6b03c376679d6ca8cba0e6c87bdb04fd4d16f68b109aab04d1f1a861d2cba955c3371ac671706ff2515682f16e3698ddae18c80c7f0f61d5c09171c422e53b5bedcdfdccb45e655a22a8f87769dac54ef83cc4d2def78ffc126594d3abbaca62f3e33ed6d937d15793372a97300da459152fddf0181eee0216a7c9582cbce6f8024501aeb1bf25895b50e4080bac720d9a7cbba3ac743920b803a9cd993ff0fa81c91e5261cb88a168d6c978b8f02b1f5cdab3bb124391c76177e656d2105116c497ef1890ec5131819fc401be753a3ee0e6e01269b2198151be9cea6e1255d069d2d5c5f528117a24e77d8735c90d47dabd26564a6ba8c63c8f81a51eea89deb561ad67d24e69e1562ed805daf0fc95117370a46c2f1f8ab48ee8ec70653d7c3e06790c7a58d3d32a32e5d918aaf4d8e93615d5a631e6426b4083135157e7c5ea849093c61c511d445d7eb6a923527e7e23999c9a9c357185facfa944234386200f0eecc65c40ca0b29b57a2285f7c0903125c1213dee353a93a2ec0fcf5a3620657cb60b3788fe84b0fd0c5b58d96904e8fe3dda9535424da1e392b8a3d602ee6ae26217b6afb8ea4a90c72198f8a8dc5e97a55c4b835763521a29b971e54fc78ed29d36f0910029ba7f08829754ea73c84940baea864669b2209f863717ec5e625b8f44f405a888b866829afc70fd438d7e162a10030288c8e99ea4e6a494fe9cf9158fb31e10ec71133a514dba65549bc25494f618edde311f932b80cd10d7947cb5c352aef170db035f9664ad31fbe1251e3ac0f65f52b3d74f6a1f882c84f07e648429c711f45b03c01e8d9a9cf0b63f50e0a7a10f2395db6571fa30bd81419a003a074401116cc24b844820919c169b1e87716012bcb48b8745cbdbbbf7abf7973190303f8bbc851023a7ac084fe872fbc56d0c4890f57520f197b3c73702b4b39b3fef57eb45184c6d7ef2cf3eb23dc05aa6b2c11e7f1d3b81ebfaec8c1b3571dd2da2178f8eea4b365ecbfa7ea57feabb24f2a7a7f312acc5698f56307576faffdf73e1974dba2c4cf844b2691a0508047d15bdab328600c28af7f1c662dfe0e2b3b26cd95140a28fd005006fb1570c59207a7f88d2c8e54ba2647ffc44b35241e6279a8da232dd0866beaef7b8a7e668dcd4ffb00dc57271eb341704d1a61b464c3a1b46d03b0d19786763e9ab46c9d02df003a0760022aba76b50fe9d1e129f4a89f73efc9ab5556e8f4131f2e6062f5a92f990fa5932b1c2c55f97162315775b458a44a18ea33139a4c4f10c809ec817d29b800fd0d6680b6c968ddf7b3818168b51a50eab1f43441531ead09e4f4fd1b07552bbee5c6fb10512df4d9f031c9a71beebd3f93fc179ac8b1eb1dc56afcb62dcaa317af91a9195ec60fb5b8b2143237758a5ff6e049ed2943f2eb3508f3522c0837ae073d022fb321c4b7c1dbeb336ff083bfaa799ba33d3505d073b2b650a15bef37bfa13741fcd8f414f8dfdea20a43a07db4a7d9f8cd74745856d3dc72d904cae41b91420531d105348ebdb6e845cb8168f606fe2e877a482e8d02b4a4fc2e3306fe0f3be0d66ffe3c0d67cef3ddc75b3b15270660cc0ebc1f2b308b73868295d8fc635237e67d5ada8a959de4b02d4945aef975ef4c140bd345dd56eba973e1cf1f8c3b96628b4707104c89028c7f783d0ee6302a75d4dcd305ce0ba26aee680731d197401977385d0d95694d3c2e1140673a59042a1297a6b27757dad2d72765a3e0b9c35a33616480ee7df0bee992f429ea0c699e4d5d2f621f92e8cb46ccec5f005b7650997f3e24f8f7f8d0e069bc74df2c2f23ae55a0cd6c37174547e25777b9393a7bfee86cfe568cd7c9aa3a93fb259df6f9e720f2b0ab2f092c8974db3a1b30cf6bc4dbe40844cb0a9c4de07da8db259d2bc38165b4c68f12c308f3e1751eb66d3afda8362ca84deb6281424d2feb1f9be7c1857ef1af6f76fc5af3d99fcf4d4e609049e1433993051c60a5b3a982cf4d1761f7d9411862dddfc109a06cbdacc76f892e7d87baa108900687a2a0b712b1d4fd4fb394231b894c93ef8a67c96cf53a6fb6cdfcfa769b164aa8136c98ca9b5338a598b0033e88e63bc3a47b8356bf0dab84c8fe382ba08f2ce001a8c78af6127b0b6b41126b97b8bfd6a05aaa90d5d27c4510b0f38848031c317ed09351be950d93543312140f4dfc9f5f837fef7d5d187855e2971342f5f28786438f53f1fc571cbdd7eb0caaa26cb1ea25944eecbd099ce9b4d4ed667ea6d96bbb83f86a135eb000ed0ba6f712c3ebe7aaab0ad8cef07b5331aff9ff0346c89e6b00c1f3a240ce1be8d2f8ff3751c901fe673d1c64ebd67e4ec04179ca9cd8b88179c80ac2e4f890b51fbc6c09e744c144fb97f12e2c968686f7f0a8a95139ffb75aec3441a7b7ab804c5fad26d31d75a1ec97e911c3395d1b6316f95097df04a16e2a28f3e67ed1fe887e0d1dbc13a486bec0a108be03202e5df7feb62f7172ade17292c3198ecaa65513d52460ebff9dd46ded8169721bb7ca24f81720ecd5869ad516aabf4f4adebc95e3267b23635077d37b25cd5aa0f99c5f402d5f3d0689ec74198ff4cf3acd3a61f61a2d682b770d42ae355dcbad9c45dbbb844560ebc4320ddd2a0a390f0947cda8ad3b93287c170a5903829ce4f9e4f477d78c8060b6d6da3e7714a138cf78c74f36f59e3057944b3df28aadbc6275bac29971e5b4278c5e36f395de97297dc97df33f7812c3c24923df9ec8f0e5802a48a9fa54edac6a98c3c4af924b5d160ac3b19d42af1e6db81721e9edd443ce27c22e69103d50c1787faa97323afc8aea035444717ec3eebc9ac94dd7b21b818d9a6dc36fcd37460be81300875448813bd7bfbfdfde305aa8d22bf1871685575da3ebac039ca6a08632eac12d064ed353618bf6ab449ee3801f76617d4c455557ac2dde8e900c1b1326a3cb561ab42825457bf103b889e09b81c504bdcd62f8eae1130a2f00f2f1f3651940c91cc007ed946b6ae5cb965517d0596f1ae9f2918fc0c4deba63cbcdc59f66a6e6cff70de4326466dc03d0a6443756ef6a83cfd2cbbd41be8be1bfab9637950f4875a77f106d3f5b5c1b5866690b30908f837c06d44824dc9b3396cc3c5c829fafb60c9c773d1c95e20f98b74357c44ff2d3fb47051e0a7a3badbfd0615a67f005c6b74cbd6f13f77b1e949ddded6b8105810b4df4a4a02d0d02e89bf97f7fb1de8cc1c7fd9781a294b4c8cf472a14a9971e4c4939e528e9bf87291c8efa79d3ad0762e4f48486f911b5793e89a806141e487955cca3f95afb4cb2c91c83f5f5336bc4c35275584183054edccc2be4a6fb8478ac16eb64fd63a199fc736e9b53df642276ce0f41fef9bce550ef74ce9b5c70d6e4fff4b558406c566b7bc29f98b9f9968874b63bf8420aeb9f38fb6cc157d06c564e1191a17d65e044bfd42c161a37ce31c8e5eaa9e9f2ef0259db8560bce4cb732aa4a29037104d56439315699f98cb39bf8173b805074a91253fef2f7499aaf1044eb99cf698d662e5ba6c6578b25cb2864c13a8aa8341fb1e53e505bc784c620f56d109bb929ae2c4d1833a283efed4bbf7d4183fd0c521cfd91e38b2c40cfc109781d680412f51931bc9b6f4e434570ceb827b98cdf4e123b0d457a7f0d58aa722fd97267276e1be343f385f0ac3536910f87ad9cf3b6f63d5c1cdb75efd426db038c80eba5b5ab4df3c7c0b4415b473c69b44db93fc42ceaf50126a54bb702aa9ab558ba05d7b93ca45eb91ab543a467beb60acef5fe68ae2240cd4ff4eee34a294ca885e15fec5dcc6b2ec1c08919bca029559f7467bc684e8e9d37d20a912ebe009aadce4e267731c5e7d8ceca917960f885bcd7565369d023053922a5b0a84602e1bc0d500309be6d5ef7ba79f3378b59590c74f2a9a3c99d6f94895187fd7fa9f9a6a3ee822a3632d8b53e75cdf4ea22d15040903fe056202cd9445d31cd0c47f4bd6acf18e4268cdfebf5084292d3d63e628f862a9575bcc9ae02b39751755be19489e563b9ba0da2e6f3d82f9cb1a68b5bb1054df19c544c95a48c808194df57db25b24eed397a05a8926eae9ef52dd7cd789a274d978c38a578d4f99acb05adc04a08b3d48730d29cd39bff4a192cd1b04dee71399ee54241af110de4fd6e6bd5fa87c6a70e76778a9c2a1539cf417dfd72ad21aaa83b24754c81f7d00c77646f", 0x2}, {0x5, 0xff, &(0x7f0000001380)="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"}, {0xfffffffc, 0xd8, &(0x7f0000001480)="b3f4498b3e34bc30abb78d85f51a60115004f0615dab240394aaeed6dcfb37a842a41fce283d7a026313f609d59ee642cc1776bd40bc006719cff0feea8110a3aa6c2c790f99933c293c5e3e889c4bea49a5ba6986e184351690f28f3ed88784afb5be7262ab6fcb62d2400229970384a6a604366501d5e2cb129c7a08b8bf7e9da04449bea88652181b99b4be5845b8d547334626d76cb0b19c4eb9e54bfefac1c170ec2841a0b2b6dd2f823a180ca3181b727216fecebde8a3b8241abfd4afe745fe6b5b6e0979b97b7bf76738fcc4863011dadefe9dc9", 0x1, 0x1}, {0x7ff, 0xd, &(0x7f0000000280)="6839ca2e896632197bade841ad", 0x1}]}) open(0x0, 0x141042, 0x0) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r3, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f00000002c0)) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:20 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657073656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a791, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760f0000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xff0f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:20 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x400000, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x1, 0x6, 0x2, 0x7, 0x0, 0x3f, 0x40200, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x4, 0x0, 0x6, 0x3, 0x7fffffff, 0xce29, 0x0, 0x100, 0x0, 0x100}, 0xffffffffffffffff, 0x10, r0, 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1179.305896] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1179.305896] [ 1179.321436] IPVS: ftp: loaded support on port[0] = 21 [ 1179.345005] IPVS: ftp: loaded support on port[0] = 21 10:59:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a792, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:21 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076100000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1179.362964] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:21 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657573656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xff7f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1179.418465] cramfs: empty filesystem [ 1179.581758] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1179.581758] 10:59:21 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076230000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1179.691669] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a793, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1179.755446] cramfs: empty filesystem [ 1179.819785] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1179.819785] [ 1179.888285] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1179.888285] [ 1180.158614] IPVS: ftp: loaded support on port[0] = 21 10:59:24 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000100)=0x100000001, r0, &(0x7f0000000140)=0x4, 0x81, 0x2) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) mmap(&(0x7f0000384000/0x4000)=nil, 0x4000, 0x4, 0x8031, 0xffffffffffffffff, 0x79a69000) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) unshare(0x30000) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0xfffe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:24 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657873656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:24 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076600000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a794, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:24 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x72000a00) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1183.281306] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1183.291287] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1183.291287] [ 1183.315325] cramfs: empty filesystem [ 1183.320323] IPVS: ftp: loaded support on port[0] = 21 10:59:24 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657323656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000300000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a795, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a913, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1183.589595] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1183.589595] [ 1183.602519] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1183.613911] IPVS: ftp: loaded support on port[0] = 21 10:59:25 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657325656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a914, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1183.637015] cramfs: empty filesystem [ 1183.708274] IPVS: ftp: loaded support on port[0] = 21 [ 1183.738864] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1183.738864] [ 1183.989976] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:27 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a796, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a915, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000500000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:27 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d707265732a656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:27 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000300000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1184.055829] cramfs: empty filesystem [ 1185.694345] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1185.694345] [ 1185.726110] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:27 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) r0 = open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) preadv(r0, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x4, 0x4) mremap(&(0x7f0000538000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000b21000/0x3000)=nil) 10:59:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a797, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a916, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1185.757244] cramfs: empty filesystem [ 1185.836636] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1185.836636] 10:59:27 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d707265732b656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1185.892267] IPVS: ftp: loaded support on port[0] = 21 [ 1185.966207] IPVS: ftp: loaded support on port[0] = 21 10:59:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000600000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a917, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1186.176388] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1186.224190] cramfs: empty filesystem [ 1186.288813] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1186.288813] [ 1186.672458] IPVS: ftp: loaded support on port[0] = 21 10:59:28 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = syz_mount_image$vxfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x519, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="f21be3ec863f27c7a03d4271a984121ca88af8e0", 0x14, 0x7}, {&(0x7f0000000240)="2a31b6a86d183c164f568356acb6d9d5e4c7456d1e87eed20b19ff6d1dd766536d70141389870d828157fb5eb8a25b4d1089b038a602ddb7a11b76f7ec01062b28248ffcc8912c9b0a36aa7359669dbca2eb3d79eef6ea494d70f289a4e073c0900a1864c333cea936c4ec11fe9bbedefdb676692d23d4", 0x77, 0x18}], 0x804080, &(0x7f0000000300)={[], [{@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_lt={'fowner<', 0xee01}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x34, 0x35, 0x62, 0x65, 0x61, 0x64, 0x61], 0x2d, [0x64, 0x65, 0x39, 0x61], 0x2d, [0x65, 0x34, 0x64, 0x39], 0x2d, [0x33, 0x62, 0x66, 0x63], 0x2d, [0x32, 0x63, 0x3b547e70085ef54, 0x7b, 0x39, 0x34, 0x37, 0x37]}}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@measure}]}) openat(r0, &(0x7f0000000400)='./file0\x00', 0x581000, 0x28) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:28 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d707265732d656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a798, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000700000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a918, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:28 executing program 1: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f0a7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1187.195791] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1187.195791] [ 1187.206643] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:28 executing program 1: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f0a7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1187.277139] IPVS: ftp: loaded support on port[0] = 21 10:59:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a799, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:28 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d707265732e656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a919, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1187.293651] cramfs: empty filesystem [ 1187.325250] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1187.325250] 10:59:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000900000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:29 executing program 1: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f0a7072657373656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1187.627167] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1187.684921] cramfs: empty filesystem [ 1187.703084] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1187.703084] [ 1188.164459] IPVS: ftp: loaded support on port[0] = 21 10:59:30 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) unshare(0x40300) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a79a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:30 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657330656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a91a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:30 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000b00000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a79b, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1189.114237] IPVS: ftp: loaded support on port[0] = 21 [ 1189.129035] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1189.129035] 10:59:30 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = syz_mount_image$vxfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x519, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="f21be3ec863f27c7a03d4271a984121ca88af8e0", 0x14, 0x7}, {&(0x7f0000000240)="2a31b6a86d183c164f568356acb6d9d5e4c7456d1e87eed20b19ff6d1dd766536d70141389870d828157fb5eb8a25b4d1089b038a602ddb7a11b76f7ec01062b28248ffcc8912c9b0a36aa7359669dbca2eb3d79eef6ea494d70f289a4e073c0900a1864c333cea936c4ec11fe9bbedefdb676692d23d4", 0x77, 0x18}], 0x804080, &(0x7f0000000300)={[], [{@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fowner_lt={'fowner<', 0xee01}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x34, 0x35, 0x62, 0x65, 0x61, 0x64, 0x61], 0x2d, [0x64, 0x65, 0x39, 0x61], 0x2d, [0x65, 0x34, 0x64, 0x39], 0x2d, [0x33, 0x62, 0x66, 0x63], 0x2d, [0x32, 0x63, 0x3b547e70085ef54, 0x7b, 0x39, 0x34, 0x37, 0x37]}}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@measure}]}) openat(r0, &(0x7f0000000400)='./file0\x00', 0x581000, 0x28) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a91b, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1189.156465] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000f00000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:30 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657358656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a79c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1189.237325] cramfs: empty filesystem [ 1189.456687] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1189.456687] [ 1189.481428] IPVS: ftp: loaded support on port[0] = 21 [ 1189.595965] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1189.660451] cramfs: empty filesystem [ 1189.993797] IPVS: ftp: loaded support on port[0] = 21 10:59:33 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) clone(0x20800080, &(0x7f0000000180)="dd367325751d46b070fc", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000340)="1b86b61d169faee8b9c670cfc833123d2f8b1005357d11dbcc01f0111ae42731e863029cdec9079b6c072b292c56881563829865abf517f6aac04b233c44044105a5b6f0eda49b8facbe12ea441a7519c714c3c29a5f828d9ed73a404dc1b5723ad61c6bcb7730d029d8c6039fff17af0ff409372af812e371e13c4336b54fa34256c8cc49cd512744bd661af2e56f47a7b54965226f0ab3a4fedfae370818aae3d7e10cb897c6a4aa1ba703882e968a3709865f98f642f8bab9f27b66131ff03559d06e994f6e0bc988aa1c1c05000000aea0c742f355f40f37de1f") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:33 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000b00000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a91c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076002000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:33 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657363656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a79d, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:33 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r1, 0x0, 0x4800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f00008aa000/0x3000)=nil, &(0x7f00008d6000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000201000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000a37000/0x3000)=nil, &(0x7f000094e000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000104000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)="1c16e0d777479ab0b3a8a60a9d85fb1dadc31262a16dd68117a44ec0142d3791adcf6aa84f09d759eb08fb722fe775047d01f92e298331fd770c04a5a3529ca6a06ed641b7d7365c14c067bc5aa97c893ae531f2b774706891f6aa9010cf21a373ab5aeb34a5658f1a03a2400790c9af5a693d1f185d8f68d9aed12151dc1010d7c470d8d5dd5980844743a0e2d5b98f09f95594aeda9ecf47a3a528400c1e518d09ab60dc7435eb4ab3b3b16d857b4919b7a7e4546a35c25348babb01f2c4d7c7bc3f009ca983b61896ec7b63ecef7ab0c37cb9e91c33c1", 0xd8, r0}, 0x68) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f00000001c0)=0x4, 0x4) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r2, 0x0, 0x4800) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000001ac0)={0x30, r4, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x1c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth0_to_batadv\x00'}}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x258, r4, 0x3, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x190, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "1b2eda7efaf3837cff5d4544b13db9ddfe2d0c11503a31e5c0bde7df3fbd74b91486ac"}}, @TIPC_NLA_NODE_ID={0x8e, 0x3, "6561a8319762af50f05c4eeee709449cddce20c03dc296744090b8bb5e784ab008d70502424ac8b99391868a6d8a9ec108c2c2c6435fa28f21a14a8c4909ad324696013636dd021b3720d1094d3e06de35d3d2b19cc34af626f3fd87b8925353011dbeb26064e13e5f85278f91c990994d225e08e33f779c109a4605906b82ee938468bb3b509c2d70c0"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "3fff9d1c0f4b616bc7cc0996c4194cfdac46aa0a55d3eabf71734b0b034eb0ca53"}}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "e21e19a0ddd70d9a14f4812dcd13a2933327757aa55a0e8cf1f081a723c3e08673"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7b2dae41}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdff}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x4004011}, 0x4044) [ 1192.297520] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1192.297520] [ 1192.326680] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a79e, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:34 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657364656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a91d, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1192.363245] cramfs: empty filesystem [ 1192.455109] IPVS: ftp: loaded support on port[0] = 21 [ 1192.470049] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1192.470049] 10:59:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076002300000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1192.636835] IPVS: ftp: loaded support on port[0] = 21 10:59:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a79f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1192.822208] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1192.822208] [ 1192.833703] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1192.882782] cramfs: empty filesystem [ 1193.006197] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1193.006197] [ 1193.203036] IPVS: ftp: loaded support on port[0] = 21 10:59:37 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657369656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a91e, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076003f00000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:37 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) unshare(0x40000800) r0 = syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x3b2e, 0x2, &(0x7f0000000440)=[{&(0x7f0000000300)="8fdb53214dcce841b76134662b80abda2a3f409a65913cf87b189d8e1e8afbc583be7630b8982db4c292789f32f99827b31694d570e06d58053bfa9396ee9dbcdb59002c1ad36d1ce90e6628627797fe82a7f1c6db6462c7a2b3fceb7447988eedada1dc613da13bbb4ebc178cc95bd4f6ca1cf43467cca053742e398393d86334134603baa7fb3d8432fce8484498e289b18b3663ddb36069baaf0cfa279140ba0baf63e4cb273742614063315fff2000d1958e1ec81e880635c52101bdc943abcc6f77127bb91b6f8c30f42edfb7e9", 0xd0, 0x5}, {&(0x7f0000000400), 0x0, 0xbc54}], 0x8010, &(0x7f0000000480)={[{@block={'block', 0x3d, 0x800}}, {@nocompress}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_user={'obj_user', 0x3d, ',))\\#,$[[.)%!\\'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@subj_role={'subj_role', 0x3d, '/dev/uhid\x00'}}, {@pcr={'pcr', 0x3d, 0x35}}]}) signalfd(r0, &(0x7f0000000540)={[0x488]}, 0x8) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x0, 0x7, 0x0, 0x6222886f, 0x1040, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x5}, 0x18008, 0x7, 0x3ff, 0x9, 0x7, 0x3f, 0xfffe, 0x0, 0x6, 0x0, 0x1ff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) 10:59:37 executing program 0: clone(0x200000002a810180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0xfa, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xd, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) clone(0x1000080, &(0x7f0000000180)="483d7df9f4cddf3bf2c36bbb30a81d1e525b35dfb3422e9dd7aa3ae89c95659e4ce21f5bbc9dbd9d75ecf1dd03995a9ab89d0abd636c79dd9ef24902067c", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a9b2eaf0a9b6e8c7c22e26181dfcd92529c5de39755adcd8ea4de6be095141868f36e719759e1f89f69540de6da869713f74520a161c07c5a535f289becd782d6fc3ae752c1c540d88ef5142d136503fcdafcd4f00") ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a91f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1196.057616] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1196.057616] [ 1196.088630] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1196.153659] IPVS: ftp: loaded support on port[0] = 21 10:59:37 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d707265736c656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a1, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076004000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a920, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1196.194440] cramfs: empty filesystem [ 1196.275201] IPVS: ftp: loaded support on port[0] = 21 [ 1196.383579] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1196.383579] [ 1196.397664] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:38 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d707265736f656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1196.426959] cramfs: empty filesystem [ 1196.500766] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1196.500766] 10:59:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076006000000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1196.624524] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a921, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:38 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657370656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1196.684156] cramfs: empty filesystem [ 1196.820782] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1196.820782] [ 1196.878983] IPVS: ftp: loaded support on port[0] = 21 [ 1196.915010] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1196.965513] cramfs: empty filesystem [ 1196.966170] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1196.966170] 10:59:40 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) unshare(0x40000800) r0 = syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x3b2e, 0x2, &(0x7f0000000440)=[{&(0x7f0000000300)="8fdb53214dcce841b76134662b80abda2a3f409a65913cf87b189d8e1e8afbc583be7630b8982db4c292789f32f99827b31694d570e06d58053bfa9396ee9dbcdb59002c1ad36d1ce90e6628627797fe82a7f1c6db6462c7a2b3fceb7447988eedada1dc613da13bbb4ebc178cc95bd4f6ca1cf43467cca053742e398393d86334134603baa7fb3d8432fce8484498e289b18b3663ddb36069baaf0cfa279140ba0baf63e4cb273742614063315fff2000d1958e1ec81e880635c52101bdc943abcc6f77127bb91b6f8c30f42edfb7e9", 0xd0, 0x5}, {&(0x7f0000000400), 0x0, 0xbc54}], 0x8010, &(0x7f0000000480)={[{@block={'block', 0x3d, 0x800}}, {@nocompress}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_user={'obj_user', 0x3d, ',))\\#,$[[.)%!\\'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@subj_role={'subj_role', 0x3d, '/dev/uhid\x00'}}, {@pcr={'pcr', 0x3d, 0x35}}]}) signalfd(r0, &(0x7f0000000540)={[0x488]}, 0x8) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x0, 0x7, 0x0, 0x6222886f, 0x1040, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x5}, 0x18008, 0x7, 0x3ff, 0x9, 0x7, 0x3f, 0xfffe, 0x0, 0x6, 0x0, 0x1ff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) 10:59:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a3, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a922, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:40 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657375656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076c0ed00000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:40 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x902, 0x0, 0x100000, 0x8}, 0x0, 0xffffffffffffffff, r0, 0xa) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x541842, 0x44) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) unshare(0x20020200) [ 1199.006493] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1199.050080] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1199.050080] 10:59:40 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657378656420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a923, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1199.085497] cramfs: empty filesystem [ 1199.157778] IPVS: ftp: loaded support on port[0] = 21 [ 1199.193655] IPVS: ftp: loaded support on port[0] = 21 [ 1199.273734] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1199.273734] 10:59:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760fff00000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1199.364020] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a924, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:41 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d70726573730a6420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1199.380162] cramfs: empty filesystem [ 1199.589426] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1199.589426] [ 1199.724904] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1199.724904] [ 1199.732602] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1199.762351] cramfs: empty filesystem [ 1199.998340] IPVS: ftp: loaded support on port[0] = 21 10:59:44 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) unshare(0x40000800) r0 = syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x3b2e, 0x2, &(0x7f0000000440)=[{&(0x7f0000000300)="8fdb53214dcce841b76134662b80abda2a3f409a65913cf87b189d8e1e8afbc583be7630b8982db4c292789f32f99827b31694d570e06d58053bfa9396ee9dbcdb59002c1ad36d1ce90e6628627797fe82a7f1c6db6462c7a2b3fceb7447988eedada1dc613da13bbb4ebc178cc95bd4f6ca1cf43467cca053742e398393d86334134603baa7fb3d8432fce8484498e289b18b3663ddb36069baaf0cfa279140ba0baf63e4cb273742614063315fff2000d1958e1ec81e880635c52101bdc943abcc6f77127bb91b6f8c30f42edfb7e9", 0xd0, 0x5}, {&(0x7f0000000400), 0x0, 0xbc54}], 0x8010, &(0x7f0000000480)={[{@block={'block', 0x3d, 0x800}}, {@nocompress}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_user={'obj_user', 0x3d, ',))\\#,$[[.)%!\\'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@subj_role={'subj_role', 0x3d, '/dev/uhid\x00'}}, {@pcr={'pcr', 0x3d, 0x35}}]}) signalfd(r0, &(0x7f0000000540)={[0x488]}, 0x8) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x0, 0x7, 0x0, 0x6222886f, 0x1040, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x5}, 0x18008, 0x7, 0x3ff, 0x9, 0x7, 0x3f, 0xfffe, 0x0, 0x6, 0x0, 0x1ff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) 10:59:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a5, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a925, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076ffff03000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:44 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373256420524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:44 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) clone(0x801000, &(0x7f0000000180)="ea6922f27f3b18ee744fe2b413955fc4b1238b4b35e8ec1959bb872155ff68ed29229347cdaebe20b9c68c7ec3d769a5b1f0d1d86b9403d0d5fa400b491279f326499c08131c81f6a4ff29a5cc71f81ce4f00710a32244106ba82abb20b2c65c69a1aec6d62bd966f792a2444c0fa1f63d40c069a4a80cec5f2044424c793987d1be8e2de2b1fa3a52c7653126eb3f291c43cd77a3052482b6bb616184acd0f888775a24e8b4d45e841b9d58750cfdcd4aad0bed9e4c6bccd3a6683a8f09da1d8e4c4944ca670a3dad09eb131236d4addb5c80d359", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="9eb142f14c102b82ae70efc8c1a8a9bc44621c881e94c831a6f303d578b9a62fd885655fe6845a71b38b1f54f8c22fd262") open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1202.809870] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1202.809870] [ 1202.858231] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000004000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a926, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1202.912457] cramfs: empty filesystem [ 1202.929649] IPVS: ftp: loaded support on port[0] = 21 [ 1202.940232] IPVS: ftp: loaded support on port[0] = 21 10:59:44 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373650a20524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1203.088440] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1203.088440] 10:59:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a927, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1203.212469] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1203.212469] [ 1203.223802] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a7, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1203.333511] cramfs: empty filesystem [ 1203.702659] IPVS: ftp: loaded support on port[0] = 21 10:59:47 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373652520524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:47 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x48420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x6, 0x0, 0x0, 0x4000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000010000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:47 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x902, 0x0, 0x100000, 0x8}, 0x0, 0xffffffffffffffff, r0, 0xa) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x541842, 0x44) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) unshare(0x20020200) 10:59:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a928, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a8, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1206.009358] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1206.010022] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1206.010022] [ 1206.028123] IPVS: ftp: loaded support on port[0] = 21 10:59:47 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373652e20524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a929, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1206.039166] cramfs: empty filesystem [ 1206.128357] IPVS: ftp: loaded support on port[0] = 21 10:59:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7a9, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1206.193703] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1206.193703] 10:59:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076ffff1f000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:48 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373652f20524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1206.356927] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a92a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1206.375164] cramfs: empty filesystem [ 1206.499435] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1206.499435] [ 1206.600344] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1206.612971] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1206.612971] [ 1206.677228] cramfs: empty filesystem [ 1206.883377] IPVS: ftp: loaded support on port[0] = 21 10:59:48 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 10:59:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7aa, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:48 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x6, 0x0, 0xba, 0x3f, 0x0, 0x9, 0x4000, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000180), 0x2}, 0x1100, 0xffffffffffff9461, 0x1ff, 0x0, 0x9, 0x527, 0x544, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x1) r1 = open(0x0, 0x141042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x7}}, './file0\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r3, &(0x7f0000000280)=0xffffffffffff55f4, 0x1) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="f2000026bd70000100", @ANYRES32=0x0, @ANYBLOB="0c009900080000006c"], 0x30}, 0x1, 0x0, 0x0, 0x20044096}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r4, 0x2, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x2}, @val={0x8}, @val={0xc, 0x99, {0x0, 0x2a}}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20004050}, 0x8000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000020000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a92b, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:48 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656408524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:48 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0xce, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) shmget$private(0x0, 0x2000, 0x54000000, &(0x7f00000ee000/0x2000)=nil) 10:59:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7ab, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1207.421245] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1207.459749] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1207.459749] 10:59:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a92c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:49 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d707265737365640a524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1207.489583] cramfs: empty filesystem [ 1207.526572] IPVS: ftp: loaded support on port[0] = 21 [ 1207.560036] IPVS: ftp: loaded support on port[0] = 21 [ 1207.629859] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1207.629859] 10:59:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7ac, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000040000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1207.861898] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1207.867623] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1207.867623] 10:59:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a92d, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:49 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656410524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1207.891333] cramfs: empty filesystem [ 1208.005053] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1208.005053] [ 1208.204199] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1208.247297] IPVS: ftp: loaded support on port[0] = 21 10:59:50 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa020000, &(0x7f0000000180)="637885cf81d68fdc121b7c6800892ba39d8d5b5fe22e77d72c37a6e1f8d4b3a706e65de8a7e89112bdfe8c8b461443f8859ee06c67ecdc58cc78f0846b4b0016059afbf6c61b", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="465a2a03b3345555b9774dcb7cf10b6833243a244ceb06ccc652a172188568f1ea6e9c7393936f60cc21c98e459f35dbf2a3de24fcb0acb24966be25b5f0a4bdcb665d368803fb3e3e194009318491dac34c3c3e817e8092be74237cfd1511d2211b6a9cc2ff44c3f563debd1880a54ae70de30612f7635d326899b5d5a4545ac6cea2997905e23622f03cf92c172ec19772e20f7c53566762973b3fdfc5453ed5b49a575307b718da2fa33935904d6d876d05fc85c078d4ba21983c66d8b2e9d804586c39999d842a03afd1d62ee4fb9e") perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000060000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7ad, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a92e, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:50 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656413524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:50 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0xce, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) shmget$private(0x0, 0x2000, 0x54000000, &(0x7f00000ee000/0x2000)=nil) [ 1208.266240] cramfs: empty filesystem [ 1208.945410] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1208.945410] [ 1208.976893] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a92f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1209.022613] cramfs: empty filesystem [ 1209.036791] IPVS: ftp: loaded support on port[0] = 21 10:59:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7ae, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1209.086630] IPVS: ftp: loaded support on port[0] = 21 10:59:50 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656414524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1209.143040] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1209.143040] 10:59:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076ffff80000000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1209.426074] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a930, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7af, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1209.467364] cramfs: empty filesystem [ 1209.476011] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1209.476011] [ 1209.650252] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1209.650252] [ 1210.027715] IPVS: ftp: loaded support on port[0] = 21 10:59:51 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xc520, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xf50e0f2eb70ebb44, 0x20008002, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 10:59:51 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656418524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a931, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000010000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:51 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0xce, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) shmget$private(0x0, 0x2000, 0x54000000, &(0x7f00000ee000/0x2000)=nil) [ 1210.329611] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1210.329611] [ 1210.374650] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1210.407002] IPVS: ftp: loaded support on port[0] = 21 [ 1210.425727] IPVS: ftp: loaded support on port[0] = 21 10:59:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a932, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:52 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656425524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1210.439628] cramfs: empty filesystem [ 1210.493963] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1210.493963] 10:59:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b1, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000020000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1210.783286] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a933, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1210.846918] cramfs: empty filesystem [ 1210.897570] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1210.897570] [ 1211.066150] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1211.066150] [ 1211.305587] IPVS: ftp: loaded support on port[0] = 21 10:59:53 executing program 0: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/snmp\x00') ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1ff) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x0, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x980913, 0x7fff, '\x00', @value=0x1}}) open(0x0, 0x141042, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5118, 0x700}], 0x1, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000426000/0x4000)=nil, 0x4000, 0x12) 10:59:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a934, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:53 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656441524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000030000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b3, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1211.603406] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1211.637145] cramfs: empty filesystem [ 1211.661584] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1211.661584] [ 1211.798929] IPVS: ftp: loaded support on port[0] = 21 [ 1212.323198] IPVS: ftp: loaded support on port[0] = 21 10:59:55 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 1) 10:59:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:55 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656460524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a935, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000040000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:55 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000030000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1214.125158] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:55 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 1) 10:59:55 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:55 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656464524f4d46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1214.167388] cramfs: empty filesystem [ 1214.174350] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1214.174350] 10:59:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a936, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b5, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1214.300100] FAULT_INJECTION: forcing a failure. [ 1214.300100] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.345581] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1214.345581] [ 1214.369543] CPU: 0 PID: 2407 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1214.377367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.386755] Call Trace: [ 1214.389356] dump_stack+0x1fc/0x2ef [ 1214.393100] should_fail.cold+0xa/0xf [ 1214.396928] ? setup_fault_attr+0x200/0x200 [ 1214.401260] ? lock_acquire+0x170/0x3c0 [ 1214.405253] __should_failslab+0x115/0x180 [ 1214.409501] should_failslab+0x5/0x10 [ 1214.413311] kmem_cache_alloc_node+0x245/0x3b0 [ 1214.417915] __alloc_skb+0x71/0x560 [ 1214.421552] netlink_sendmsg+0x9f6/0xc50 [ 1214.425611] ? aa_af_perm+0x230/0x230 [ 1214.430106] ? nlmsg_notify+0x1f0/0x1f0 [ 1214.434078] ? kernel_recvmsg+0x220/0x220 [ 1214.438221] ? nlmsg_notify+0x1f0/0x1f0 [ 1214.442196] sock_sendmsg+0xc3/0x120 [ 1214.445899] ___sys_sendmsg+0x7bb/0x8e0 [ 1214.449984] ? copy_msghdr_from_user+0x440/0x440 [ 1214.454746] ? __fget+0x32f/0x510 [ 1214.458201] ? lock_downgrade+0x720/0x720 [ 1214.462344] ? check_preemption_disabled+0x41/0x280 [ 1214.467374] ? check_preemption_disabled+0x41/0x280 [ 1214.472384] ? __fget+0x356/0x510 [ 1214.475831] ? do_dup2+0x450/0x450 [ 1214.479359] ? lock_downgrade+0x720/0x720 [ 1214.483497] ? vfs_write+0x3d7/0x540 [ 1214.487223] ? __fdget+0x1d0/0x230 [ 1214.490775] __x64_sys_sendmsg+0x132/0x220 [ 1214.495007] ? __sys_sendmsg+0x1b0/0x1b0 [ 1214.499057] ? vfs_write+0x393/0x540 [ 1214.502777] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1214.508134] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1214.513162] ? do_syscall_64+0x21/0x620 [ 1214.517242] do_syscall_64+0xf9/0x620 [ 1214.521054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1214.526253] RIP: 0033:0x7f4ea6b3ca39 [ 1214.529960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1214.548949] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1214.556667] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1214.563938] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1214.571196] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1214.578454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1214.585729] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 10:59:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000050000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1214.637471] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a937, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:56 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f0a46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:56 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b7, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a938, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1214.693773] cramfs: empty filesystem [ 1214.951155] MTD: Attempt to mount non-MTD device "/dev/loop2" 10:59:56 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 2) 10:59:56 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f2546537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b8, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a939, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:56 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d03, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1214.984346] cramfs: empty filesystem [ 1215.219333] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1215.219333] [ 1215.253308] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1215.255604] FAULT_INJECTION: forcing a failure. [ 1215.255604] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.286447] cramfs: empty filesystem [ 1215.351870] CPU: 1 PID: 2486 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1215.363495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.372889] Call Trace: [ 1215.375497] dump_stack+0x1fc/0x2ef [ 1215.379143] should_fail.cold+0xa/0xf [ 1215.382993] ? setup_fault_attr+0x200/0x200 [ 1215.387323] ? lock_acquire+0x170/0x3c0 [ 1215.391315] __should_failslab+0x115/0x180 [ 1215.395563] should_failslab+0x5/0x10 [ 1215.399377] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1215.404498] __kmalloc_node_track_caller+0x38/0x70 [ 1215.409438] __alloc_skb+0xae/0x560 [ 1215.413081] netlink_sendmsg+0x9f6/0xc50 [ 1215.417267] ? aa_af_perm+0x230/0x230 [ 1215.421075] ? nlmsg_notify+0x1f0/0x1f0 [ 1215.425049] ? kernel_recvmsg+0x220/0x220 [ 1215.429214] ? nlmsg_notify+0x1f0/0x1f0 [ 1215.433193] sock_sendmsg+0xc3/0x120 [ 1215.436914] ___sys_sendmsg+0x7bb/0x8e0 [ 1215.440896] ? copy_msghdr_from_user+0x440/0x440 [ 1215.445662] ? __fget+0x32f/0x510 [ 1215.449128] ? lock_downgrade+0x720/0x720 [ 1215.453280] ? check_preemption_disabled+0x41/0x280 [ 1215.458300] ? check_preemption_disabled+0x41/0x280 [ 1215.463341] ? __fget+0x356/0x510 [ 1215.466802] ? do_dup2+0x450/0x450 [ 1215.470347] ? lock_downgrade+0x720/0x720 [ 1215.474513] ? vfs_write+0x3d7/0x540 [ 1215.478241] ? __fdget+0x1d0/0x230 [ 1215.481794] __x64_sys_sendmsg+0x132/0x220 [ 1215.486034] ? __sys_sendmsg+0x1b0/0x1b0 [ 1215.490097] ? vfs_write+0x393/0x540 [ 1215.493831] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1215.499201] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1215.504223] ? do_syscall_64+0x21/0x620 [ 1215.508208] do_syscall_64+0xf9/0x620 [ 1215.512016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1215.517206] RIP: 0033:0x7f4ea6b3ca39 [ 1215.520923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1215.539830] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:59:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7b9, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000060000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:57 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4c46537d359c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a93a, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1215.547542] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1215.554809] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1215.562077] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1215.569352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1215.576624] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 [ 1215.693460] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1215.693460] 10:59:57 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 3) [ 1215.780355] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1215.792036] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1215.792036] 10:59:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7ba, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a93b, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:57 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d239c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000070000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:57 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d04, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1215.846422] cramfs: empty filesystem [ 1215.960003] FAULT_INJECTION: forcing a failure. [ 1215.960003] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.044384] CPU: 0 PID: 2532 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1216.052663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.062110] Call Trace: [ 1216.064715] dump_stack+0x1fc/0x2ef [ 1216.068366] should_fail.cold+0xa/0xf [ 1216.072183] ? setup_fault_attr+0x200/0x200 [ 1216.076522] ? HARDIRQ_verbose+0x10/0x10 [ 1216.080596] ? lock_downgrade+0x720/0x720 [ 1216.084755] ? check_preemption_disabled+0x41/0x280 [ 1216.089790] __should_failslab+0x115/0x180 [ 1216.094049] should_failslab+0x5/0x10 [ 1216.097902] kmem_cache_alloc+0x3f/0x370 [ 1216.102066] skb_clone+0x151/0x3d0 [ 1216.105718] netlink_deliver_tap+0x955/0xb00 [ 1216.110147] netlink_unicast+0x545/0x690 [ 1216.114277] ? netlink_sendskb+0x110/0x110 [ 1216.118524] ? _copy_from_iter_full+0x229/0x7c0 [ 1216.123205] ? __phys_addr_symbol+0x2c/0x70 [ 1216.127549] ? __check_object_size+0x17b/0x3e0 [ 1216.132154] netlink_sendmsg+0x6c3/0xc50 [ 1216.136232] ? aa_af_perm+0x230/0x230 [ 1216.140036] ? nlmsg_notify+0x1f0/0x1f0 [ 1216.144015] ? kernel_recvmsg+0x220/0x220 [ 1216.148187] ? nlmsg_notify+0x1f0/0x1f0 [ 1216.152169] sock_sendmsg+0xc3/0x120 [ 1216.155981] ___sys_sendmsg+0x7bb/0x8e0 [ 1216.159959] ? copy_msghdr_from_user+0x440/0x440 [ 1216.164720] ? __fget+0x32f/0x510 [ 1216.168180] ? lock_downgrade+0x720/0x720 [ 1216.172332] ? check_preemption_disabled+0x41/0x280 [ 1216.177355] ? check_preemption_disabled+0x41/0x280 [ 1216.182399] ? __fget+0x356/0x510 [ 1216.185874] ? do_dup2+0x450/0x450 [ 1216.189435] ? lock_downgrade+0x720/0x720 [ 1216.193599] ? vfs_write+0x3d7/0x540 [ 1216.197329] ? __fdget+0x1d0/0x230 [ 1216.200883] __x64_sys_sendmsg+0x132/0x220 [ 1216.205125] ? __sys_sendmsg+0x1b0/0x1b0 [ 1216.209192] ? vfs_write+0x393/0x540 [ 1216.212928] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1216.218300] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1216.223323] ? do_syscall_64+0x21/0x620 [ 1216.227305] do_syscall_64+0xf9/0x620 [ 1216.231114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1216.236305] RIP: 0033:0x7f4ea6b3ca39 [ 1216.240023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.258931] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1216.266646] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1216.273916] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1216.281219] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 10:59:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7bb, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1216.288488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1216.295759] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 10:59:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a93c, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1216.362140] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1216.362361] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1216.362361] 10:59:58 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d259c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000080000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7bc, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a93d, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1216.398288] cramfs: empty filesystem [ 1216.674787] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1216.695729] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1216.695729] 10:59:58 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 4) 10:59:58 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d2b9c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 10:59:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000090000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7bd, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a93e, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:58 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d05, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 1216.709209] cramfs: empty filesystem [ 1216.912056] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1216.964402] FAULT_INJECTION: forcing a failure. [ 1216.964402] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.972823] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1216.972823] [ 1216.987090] CPU: 1 PID: 2610 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1216.988463] cramfs: empty filesystem [ 1216.994937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.008026] Call Trace: [ 1217.010622] dump_stack+0x1fc/0x2ef [ 1217.014274] should_fail.cold+0xa/0xf [ 1217.018090] ? setup_fault_attr+0x200/0x200 [ 1217.022511] ? lock_acquire+0x170/0x3c0 [ 1217.026528] __should_failslab+0x115/0x180 [ 1217.030865] should_failslab+0x5/0x10 [ 1217.034672] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1217.039783] __kmalloc_node+0x38/0x70 [ 1217.043588] kvmalloc_node+0xb4/0xf0 [ 1217.047307] alloc_netdev_mqs+0x97/0xd50 [ 1217.051372] ? batadv_interface_change_mtu+0x90/0x90 [ 1217.056483] rtnl_create_link+0x1d4/0xa40 [ 1217.060641] rtnl_newlink+0xf45/0x15c0 [ 1217.064553] ? rtnl_getlink+0x620/0x620 [ 1217.068580] ? __lock_acquire+0x6de/0x3ff0 [ 1217.072843] ? perf_trace_lock_acquire+0xef/0x530 [ 1217.077688] ? deref_stack_reg+0x134/0x1d0 [ 1217.082032] ? get_reg+0x176/0x1f0 [ 1217.085576] ? mark_held_locks+0xf0/0xf0 [ 1217.089645] ? mark_held_locks+0xf0/0xf0 [ 1217.093715] ? __lock_acquire+0x6de/0x3ff0 [ 1217.097973] ? __update_load_avg_se+0x5ec/0xa00 [ 1217.102649] ? mark_held_locks+0xf0/0xf0 [ 1217.106728] ? perf_trace_lock_acquire+0xef/0x530 [ 1217.111583] ? __lock_acquire+0x6de/0x3ff0 [ 1217.115842] ? mark_held_locks+0xf0/0xf0 [ 1217.119996] ? perf_trace_lock_acquire+0xef/0x530 [ 1217.124891] ? mutex_trylock+0x1a0/0x1a0 [ 1217.128957] ? check_preemption_disabled+0x41/0x280 [ 1217.133979] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1217.138408] ? rtnl_getlink+0x620/0x620 [ 1217.142386] rtnetlink_rcv_msg+0x453/0xb80 [ 1217.146629] ? rtnl_calcit.isra.0+0x430/0x430 [ 1217.151130] ? memcpy+0x35/0x50 [ 1217.154501] ? netdev_pick_tx+0x2f0/0x2f0 [ 1217.158651] ? __copy_skb_header+0x414/0x500 [ 1217.163063] ? kfree_skbmem+0x140/0x140 [ 1217.167134] netlink_rcv_skb+0x160/0x440 [ 1217.171200] ? rtnl_calcit.isra.0+0x430/0x430 [ 1217.175703] ? netlink_ack+0xae0/0xae0 [ 1217.179613] netlink_unicast+0x4d5/0x690 [ 1217.183716] ? netlink_sendskb+0x110/0x110 [ 1217.187954] ? _copy_from_iter_full+0x229/0x7c0 [ 1217.192626] ? __phys_addr_symbol+0x2c/0x70 [ 1217.196953] ? __check_object_size+0x17b/0x3e0 [ 1217.201560] netlink_sendmsg+0x6c3/0xc50 [ 1217.205631] ? aa_af_perm+0x230/0x230 [ 1217.209440] ? nlmsg_notify+0x1f0/0x1f0 10:59:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7be, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1217.213446] ? kernel_recvmsg+0x220/0x220 [ 1217.217596] ? nlmsg_notify+0x1f0/0x1f0 [ 1217.221665] sock_sendmsg+0xc3/0x120 [ 1217.225378] ___sys_sendmsg+0x7bb/0x8e0 [ 1217.229343] ? copy_msghdr_from_user+0x440/0x440 [ 1217.234104] ? __fget+0x32f/0x510 [ 1217.237554] ? lock_downgrade+0x720/0x720 [ 1217.241699] ? check_preemption_disabled+0x41/0x280 [ 1217.246971] ? check_preemption_disabled+0x41/0x280 [ 1217.252150] ? __fget+0x356/0x510 [ 1217.255598] ? do_dup2+0x450/0x450 [ 1217.259122] ? lock_downgrade+0x720/0x720 [ 1217.263256] ? vfs_write+0x3d7/0x540 [ 1217.266955] ? __fdget+0x1d0/0x230 [ 1217.270493] __x64_sys_sendmsg+0x132/0x220 [ 1217.274798] ? __sys_sendmsg+0x1b0/0x1b0 [ 1217.278843] ? vfs_write+0x393/0x540 [ 1217.282557] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1217.287918] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1217.292920] ? do_syscall_64+0x21/0x620 [ 1217.296880] do_syscall_64+0xf9/0x620 [ 1217.300673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1217.305863] RIP: 0033:0x7f4ea6b3ca39 [ 1217.309571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1217.329589] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1217.337291] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1217.344594] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1217.351944] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1217.359212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1217.366478] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 10:59:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a93f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:59 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d2d9c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1217.445560] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1217.445560] 10:59:59 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 5) 10:59:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000b0000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 10:59:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7bf, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1217.635698] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1217.669990] cramfs: empty filesystem [ 1217.707660] FAULT_INJECTION: forcing a failure. [ 1217.707660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1217.723250] CPU: 1 PID: 2652 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1217.731048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.740404] Call Trace: [ 1217.743017] dump_stack+0x1fc/0x2ef [ 1217.746659] should_fail.cold+0xa/0xf [ 1217.750733] ? setup_fault_attr+0x200/0x200 [ 1217.755075] __alloc_pages_nodemask+0x239/0x2890 [ 1217.759849] ? __lock_acquire+0x6de/0x3ff0 [ 1217.764103] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1217.768955] ? widen_string+0xd8/0x2a0 [ 1217.772857] ? perf_trace_lock_acquire+0xef/0x530 [ 1217.777713] ? HARDIRQ_verbose+0x10/0x10 [ 1217.781786] ? enable_ptr_key_workfn+0x30/0x30 [ 1217.786380] cache_grow_begin+0xa4/0x8a0 [ 1217.790490] ? setup_fault_attr+0x200/0x200 [ 1217.794819] ? lock_acquire+0x170/0x3c0 [ 1217.798808] cache_alloc_refill+0x273/0x340 [ 1217.803165] kmem_cache_alloc_node_trace+0x39e/0x3b0 [ 1217.808281] __kmalloc_node+0x38/0x70 [ 1217.812111] kvmalloc_node+0xb4/0xf0 [ 1217.815833] alloc_netdev_mqs+0x97/0xd50 [ 1217.820344] ? batadv_interface_change_mtu+0x90/0x90 [ 1217.825500] rtnl_create_link+0x1d4/0xa40 [ 1217.829668] rtnl_newlink+0xf45/0x15c0 [ 1217.833580] ? rtnl_getlink+0x620/0x620 [ 1217.837580] ? __lock_acquire+0x6de/0x3ff0 [ 1217.841836] ? perf_trace_lock_acquire+0xef/0x530 [ 1217.846691] ? deref_stack_reg+0x134/0x1d0 [ 1217.850941] ? get_reg+0x176/0x1f0 [ 1217.854529] ? mark_held_locks+0xf0/0xf0 [ 1217.858603] ? mark_held_locks+0xf0/0xf0 [ 1217.862677] ? __lock_acquire+0x6de/0x3ff0 [ 1217.866930] ? __update_load_avg_se+0x5ec/0xa00 [ 1217.871618] ? mark_held_locks+0xf0/0xf0 [ 1217.875686] ? perf_trace_lock_acquire+0xef/0x530 [ 1217.880536] ? __lock_acquire+0x6de/0x3ff0 [ 1217.884788] ? mark_held_locks+0xf0/0xf0 [ 1217.888855] ? perf_trace_lock_acquire+0xef/0x530 [ 1217.893703] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1217.898245] ? mutex_trylock+0x1a0/0x1a0 [ 1217.902317] ? check_preemption_disabled+0x41/0x280 10:59:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a940, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1217.907600] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1217.912033] ? rtnl_getlink+0x620/0x620 [ 1217.916015] rtnetlink_rcv_msg+0x453/0xb80 [ 1217.920261] ? rtnl_calcit.isra.0+0x430/0x430 [ 1217.924766] ? memcpy+0x35/0x50 [ 1217.928077] ? netdev_pick_tx+0x2f0/0x2f0 [ 1217.932237] ? __copy_skb_header+0x414/0x500 [ 1217.936293] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1217.936293] [ 1217.936668] ? kfree_skbmem+0x140/0x140 [ 1217.949210] netlink_rcv_skb+0x160/0x440 [ 1217.953279] ? rtnl_calcit.isra.0+0x430/0x430 [ 1217.957774] ? netlink_ack+0xae0/0xae0 [ 1217.961665] netlink_unicast+0x4d5/0x690 [ 1217.965724] ? netlink_sendskb+0x110/0x110 [ 1217.969951] ? _copy_from_iter_full+0x229/0x7c0 [ 1217.974615] ? __phys_addr_symbol+0x2c/0x70 [ 1217.978989] ? __check_object_size+0x17b/0x3e0 [ 1217.983586] netlink_sendmsg+0x6c3/0xc50 [ 1217.987699] ? aa_af_perm+0x230/0x230 [ 1217.991523] ? nlmsg_notify+0x1f0/0x1f0 [ 1217.995493] ? kernel_recvmsg+0x220/0x220 [ 1217.999638] ? nlmsg_notify+0x1f0/0x1f0 [ 1218.003607] sock_sendmsg+0xc3/0x120 [ 1218.007328] ___sys_sendmsg+0x7bb/0x8e0 [ 1218.011300] ? copy_msghdr_from_user+0x440/0x440 [ 1218.016057] ? __fget+0x32f/0x510 [ 1218.019509] ? lock_downgrade+0x720/0x720 [ 1218.023658] ? check_preemption_disabled+0x41/0x280 [ 1218.028670] ? check_preemption_disabled+0x41/0x280 [ 1218.033772] ? __fget+0x356/0x510 [ 1218.037224] ? do_dup2+0x450/0x450 [ 1218.040757] ? lock_downgrade+0x720/0x720 [ 1218.044894] ? vfs_write+0x3d7/0x540 [ 1218.048615] ? __fdget+0x1d0/0x230 [ 1218.052151] __x64_sys_sendmsg+0x132/0x220 [ 1218.056401] ? __sys_sendmsg+0x1b0/0x1b0 [ 1218.060454] ? vfs_write+0x393/0x540 [ 1218.064168] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1218.069522] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1218.074528] ? do_syscall_64+0x21/0x620 [ 1218.078495] do_syscall_64+0xf9/0x620 [ 1218.082292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.087470] RIP: 0033:0x7f4ea6b3ca39 10:59:59 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d309c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1218.091174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1218.110063] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1218.117759] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1218.125014] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1218.132271] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1218.139526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1218.146784] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 10:59:59 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d06, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 10:59:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 10:59:59 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 6) [ 1218.272777] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1218.272777] 10:59:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000f0000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1218.383567] MTD: Attempt to mount non-MTD device "/dev/loop2" 11:00:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c1, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 11:00:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a941, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1218.446566] cramfs: empty filesystem [ 1218.481995] FAULT_INJECTION: forcing a failure. [ 1218.481995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1218.497529] CPU: 1 PID: 2697 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1218.505335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.514967] Call Trace: [ 1218.517577] dump_stack+0x1fc/0x2ef [ 1218.521225] should_fail.cold+0xa/0xf [ 1218.525051] ? check_preemption_disabled+0x41/0x280 [ 1218.530081] ? setup_fault_attr+0x200/0x200 [ 1218.534428] __alloc_pages_nodemask+0x239/0x2890 [ 1218.539232] ? __lock_acquire+0x6de/0x3ff0 [ 1218.543498] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1218.548352] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1218.553210] ? perf_trace_lock_acquire+0xef/0x530 [ 1218.558088] ? HARDIRQ_verbose+0x10/0x10 [ 1218.562258] ? ____cache_alloc_node+0x156/0x1d0 [ 1218.566952] cache_grow_begin+0xa4/0x8a0 [ 1218.571028] ? check_preemption_disabled+0x41/0x280 [ 1218.576087] ____cache_alloc_node+0x170/0x1d0 [ 1218.580689] ? check_preemption_disabled+0x41/0x280 [ 1218.585727] kmem_cache_alloc_node_trace+0xec/0x3b0 [ 1218.590757] __kmalloc_node+0x38/0x70 [ 1218.594572] kvmalloc_node+0xb4/0xf0 [ 1218.598305] alloc_netdev_mqs+0x97/0xd50 [ 1218.602385] ? batadv_interface_change_mtu+0x90/0x90 [ 1218.607510] rtnl_create_link+0x1d4/0xa40 [ 1218.611671] rtnl_newlink+0xf45/0x15c0 [ 1218.615576] ? rtnl_getlink+0x620/0x620 [ 1218.619567] ? mark_held_locks+0xf0/0xf0 [ 1218.623637] ? perf_trace_lock_acquire+0xef/0x530 [ 1218.628481] ? deref_stack_reg+0x134/0x1d0 [ 1218.632726] ? get_reg+0x176/0x1f0 [ 1218.636469] ? HARDIRQ_verbose+0x10/0x10 [ 1218.640536] ? is_bpf_text_address+0xd5/0x1b0 [ 1218.645044] ? lock_downgrade+0x720/0x720 [ 1218.649193] ? lock_acquire+0x170/0x3c0 [ 1218.653166] ? __bpf_address_lookup+0x330/0x330 [ 1218.657839] ? check_preemption_disabled+0x41/0x280 [ 1218.662865] ? is_bpf_text_address+0xfc/0x1b0 [ 1218.667368] ? kernel_text_address+0xbd/0xf0 [ 1218.671779] ? __kernel_text_address+0x9/0x30 [ 1218.676282] ? unwind_get_return_address+0x51/0x90 [ 1218.681215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.686580] ? __save_stack_trace+0xaf/0x190 [ 1218.691003] ? __lock_acquire+0x6de/0x3ff0 [ 1218.695270] ? __kasan_slab_free+0x186/0x1f0 [ 1218.699683] ? kmem_cache_free+0x7f/0x260 [ 1218.703848] ? kfree_skbmem+0xc1/0x140 [ 1218.707739] ? consume_skb+0x120/0x3d0 [ 1218.711629] ? mark_held_locks+0xf0/0xf0 [ 1218.715700] ? perf_trace_lock_acquire+0xef/0x530 [ 1218.720549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.725960] ? mutex_trylock+0x1a0/0x1a0 [ 1218.730027] ? check_preemption_disabled+0x41/0x280 [ 1218.735049] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1218.739475] ? rtnl_getlink+0x620/0x620 [ 1218.743460] rtnetlink_rcv_msg+0x453/0xb80 [ 1218.747708] ? rtnl_calcit.isra.0+0x430/0x430 [ 1218.752209] ? memcpy+0x35/0x50 [ 1218.755490] ? netdev_pick_tx+0x2f0/0x2f0 [ 1218.759639] ? __copy_skb_header+0x414/0x500 [ 1218.764056] ? kfree_skbmem+0x140/0x140 [ 1218.768041] netlink_rcv_skb+0x160/0x440 [ 1218.772109] ? rtnl_calcit.isra.0+0x430/0x430 [ 1218.776607] ? netlink_ack+0xae0/0xae0 [ 1218.780514] netlink_unicast+0x4d5/0x690 [ 1218.784589] ? netlink_sendskb+0x110/0x110 [ 1218.788824] ? _copy_from_iter_full+0x229/0x7c0 [ 1218.793497] ? __phys_addr_symbol+0x2c/0x70 [ 1218.797825] ? __check_object_size+0x17b/0x3e0 [ 1218.802416] netlink_sendmsg+0x6c3/0xc50 [ 1218.806487] ? aa_af_perm+0x230/0x230 [ 1218.810293] ? nlmsg_notify+0x1f0/0x1f0 [ 1218.814265] ? kernel_recvmsg+0x220/0x220 [ 1218.818431] ? nlmsg_notify+0x1f0/0x1f0 [ 1218.822430] sock_sendmsg+0xc3/0x120 [ 1218.826157] ___sys_sendmsg+0x7bb/0x8e0 [ 1218.830140] ? copy_msghdr_from_user+0x440/0x440 [ 1218.834902] ? __fget+0x32f/0x510 [ 1218.838452] ? lock_downgrade+0x720/0x720 [ 1218.842604] ? check_preemption_disabled+0x41/0x280 [ 1218.847624] ? check_preemption_disabled+0x41/0x280 [ 1218.852647] ? __fget+0x356/0x510 [ 1218.856111] ? do_dup2+0x450/0x450 [ 1218.859651] ? lock_downgrade+0x720/0x720 [ 1218.863818] ? vfs_write+0x3d7/0x540 [ 1218.867537] ? __fdget+0x1d0/0x230 [ 1218.871088] __x64_sys_sendmsg+0x132/0x220 [ 1218.875326] ? __sys_sendmsg+0x1b0/0x1b0 [ 1218.879385] ? vfs_write+0x393/0x540 [ 1218.883127] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1218.888494] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1218.893513] ? do_syscall_64+0x21/0x620 [ 1218.897488] do_syscall_64+0xf9/0x620 [ 1218.901297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.906483] RIP: 0033:0x7f4ea6b3ca39 [ 1218.910194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:00:00 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d379c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1218.929094] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1218.936807] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1218.944076] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1218.951349] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1218.958618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1218.965888] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 [ 1219.077547] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1219.077547] [ 1219.108371] MTD: Attempt to mount non-MTD device "/dev/loop2" 11:00:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 11:00:00 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d419c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1219.157789] cramfs: empty filesystem [ 1219.163685] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1219.163685] 11:00:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a942, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 11:00:00 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 7) 11:00:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000100000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) 11:00:00 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d08, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 11:00:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c3, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1219.390017] MTD: Attempt to mount non-MTD device "/dev/loop2" 11:00:01 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d639c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1219.415222] cramfs: empty filesystem [ 1219.475414] FAULT_INJECTION: forcing a failure. [ 1219.475414] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.524842] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1219.524842] [ 1219.551102] CPU: 0 PID: 2753 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1219.558948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.568307] Call Trace: [ 1219.570904] dump_stack+0x1fc/0x2ef [ 1219.574545] should_fail.cold+0xa/0xf [ 1219.578353] ? setup_fault_attr+0x200/0x200 [ 1219.582676] ? pcpu_alloc+0xe78/0x1190 [ 1219.586578] __should_failslab+0x115/0x180 [ 1219.590908] should_failslab+0x5/0x10 [ 1219.594883] kmem_cache_alloc_trace+0x46/0x380 [ 1219.599483] __hw_addr_create_ex+0x5b/0x310 [ 1219.603813] __hw_addr_add_ex+0x1ed/0x2b0 [ 1219.607969] dev_addr_init+0x10b/0x1f0 [ 1219.611861] ? dev_mc_flush+0x30/0x30 [ 1219.615679] alloc_netdev_mqs+0x13d/0xd50 [ 1219.619832] ? batadv_interface_change_mtu+0x90/0x90 [ 1219.624946] rtnl_create_link+0x1d4/0xa40 [ 1219.629122] rtnl_newlink+0xf45/0x15c0 [ 1219.633109] ? rtnl_getlink+0x620/0x620 [ 1219.637103] ? __lock_acquire+0x6de/0x3ff0 [ 1219.641351] ? perf_trace_lock_acquire+0xef/0x530 [ 1219.646194] ? deref_stack_reg+0x134/0x1d0 [ 1219.650428] ? get_reg+0x176/0x1f0 [ 1219.653970] ? mark_held_locks+0xf0/0xf0 [ 1219.658034] ? mark_held_locks+0xf0/0xf0 [ 1219.662142] ? __lock_acquire+0x6de/0x3ff0 [ 1219.666390] ? __update_load_avg_se+0x5ec/0xa00 [ 1219.671065] ? mark_held_locks+0xf0/0xf0 [ 1219.675130] ? perf_trace_lock_acquire+0xef/0x530 [ 1219.679978] ? __lock_acquire+0x6de/0x3ff0 [ 1219.684231] ? mark_held_locks+0xf0/0xf0 [ 1219.688301] ? perf_trace_lock_acquire+0xef/0x530 [ 1219.693152] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1219.697691] ? mutex_trylock+0x1a0/0x1a0 [ 1219.701756] ? check_preemption_disabled+0x41/0x280 [ 1219.706783] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1219.711212] ? rtnl_getlink+0x620/0x620 [ 1219.715187] rtnetlink_rcv_msg+0x453/0xb80 [ 1219.719436] ? rtnl_calcit.isra.0+0x430/0x430 11:00:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a943, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1219.724114] ? memcpy+0x35/0x50 [ 1219.727402] ? netdev_pick_tx+0x2f0/0x2f0 [ 1219.731553] ? __copy_skb_header+0x414/0x500 [ 1219.735970] ? kfree_skbmem+0x140/0x140 [ 1219.739956] netlink_rcv_skb+0x160/0x440 [ 1219.744024] ? rtnl_calcit.isra.0+0x430/0x430 [ 1219.748530] ? netlink_ack+0xae0/0xae0 [ 1219.752440] netlink_unicast+0x4d5/0x690 [ 1219.756510] ? netlink_sendskb+0x110/0x110 [ 1219.760749] ? _copy_from_iter_full+0x229/0x7c0 [ 1219.765425] ? __phys_addr_symbol+0x2c/0x70 [ 1219.769754] ? __check_object_size+0x17b/0x3e0 [ 1219.774341] netlink_sendmsg+0x6c3/0xc50 [ 1219.778410] ? aa_af_perm+0x230/0x230 [ 1219.782211] ? nlmsg_notify+0x1f0/0x1f0 [ 1219.786185] ? kernel_recvmsg+0x220/0x220 [ 1219.790342] ? nlmsg_notify+0x1f0/0x1f0 [ 1219.794583] sock_sendmsg+0xc3/0x120 [ 1219.798301] ___sys_sendmsg+0x7bb/0x8e0 [ 1219.802278] ? copy_msghdr_from_user+0x440/0x440 [ 1219.807043] ? __fget+0x32f/0x510 [ 1219.810513] ? lock_downgrade+0x720/0x720 [ 1219.814663] ? check_preemption_disabled+0x41/0x280 [ 1219.819684] ? check_preemption_disabled+0x41/0x280 [ 1219.824712] ? __fget+0x356/0x510 [ 1219.828173] ? do_dup2+0x450/0x450 [ 1219.831717] ? lock_downgrade+0x720/0x720 [ 1219.835875] ? vfs_write+0x3d7/0x540 [ 1219.839597] ? __fdget+0x1d0/0x230 [ 1219.843145] __x64_sys_sendmsg+0x132/0x220 [ 1219.847381] ? __sys_sendmsg+0x1b0/0x1b0 [ 1219.851453] ? vfs_write+0x393/0x540 [ 1219.855192] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1219.860561] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1219.865581] ? do_syscall_64+0x21/0x620 [ 1219.869568] do_syscall_64+0xf9/0x620 [ 1219.873378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1219.878569] RIP: 0033:0x7f4ea6b3ca39 [ 1219.882290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.901194] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1219.908912] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1219.916186] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1219.923460] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.930729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1219.937997] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 11:00:01 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 8) [ 1219.984607] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1219.984607] 11:00:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000200000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1220.036679] MTD: Attempt to mount non-MTD device "/dev/loop2" 11:00:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 11:00:01 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d649c1c0000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1220.089958] cramfs: empty filesystem [ 1220.149398] FAULT_INJECTION: forcing a failure. [ 1220.149398] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.206809] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1220.206809] [ 1220.214833] CPU: 1 PID: 2785 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1220.223211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.232567] Call Trace: [ 1220.235168] dump_stack+0x1fc/0x2ef [ 1220.238808] should_fail.cold+0xa/0xf [ 1220.242614] ? setup_fault_attr+0x200/0x200 [ 1220.246947] ? lock_acquire+0x170/0x3c0 [ 1220.250939] __should_failslab+0x115/0x180 [ 1220.255194] should_failslab+0x5/0x10 [ 1220.258995] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1220.264107] __kmalloc_node+0x38/0x70 [ 1220.267914] kvmalloc_node+0x61/0xf0 [ 1220.271640] alloc_netdev_mqs+0x69f/0xd50 [ 1220.275895] rtnl_create_link+0x1d4/0xa40 [ 1220.280063] rtnl_newlink+0xf45/0x15c0 [ 1220.283975] ? rtnl_getlink+0x620/0x620 [ 1220.287974] ? __lock_acquire+0x6de/0x3ff0 [ 1220.292227] ? perf_trace_lock_acquire+0xef/0x530 [ 1220.297081] ? deref_stack_reg+0x134/0x1d0 [ 1220.301324] ? get_reg+0x176/0x1f0 [ 1220.304872] ? mark_held_locks+0xf0/0xf0 [ 1220.308943] ? mark_held_locks+0xf0/0xf0 [ 1220.313019] ? __lock_acquire+0x6de/0x3ff0 [ 1220.317276] ? __update_load_avg_se+0x5ec/0xa00 [ 1220.321960] ? mark_held_locks+0xf0/0xf0 [ 1220.326124] ? perf_trace_lock_acquire+0xef/0x530 [ 1220.330983] ? __lock_acquire+0x6de/0x3ff0 [ 1220.335243] ? mark_held_locks+0xf0/0xf0 [ 1220.339315] ? perf_trace_lock_acquire+0xef/0x530 [ 1220.344170] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1220.348717] ? mutex_trylock+0x1a0/0x1a0 [ 1220.352873] ? check_preemption_disabled+0x41/0x280 [ 1220.357896] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1220.362342] ? rtnl_getlink+0x620/0x620 [ 1220.366321] rtnetlink_rcv_msg+0x453/0xb80 [ 1220.370563] ? rtnl_calcit.isra.0+0x430/0x430 [ 1220.375152] ? lock_downgrade+0x720/0x720 [ 1220.379306] ? rcu_read_unlock_special+0x4ce/0xfc0 [ 1220.384237] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1220.389347] netlink_rcv_skb+0x160/0x440 [ 1220.393410] ? rtnl_calcit.isra.0+0x430/0x430 [ 1220.397909] ? netlink_ack+0xae0/0xae0 [ 1220.401818] netlink_unicast+0x4d5/0x690 11:00:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c5, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1220.405885] ? netlink_sendskb+0x110/0x110 [ 1220.410121] ? _copy_from_iter_full+0x229/0x7c0 [ 1220.414792] ? __phys_addr_symbol+0x2c/0x70 [ 1220.419122] ? __check_object_size+0x17b/0x3e0 [ 1220.423709] netlink_sendmsg+0x6c3/0xc50 [ 1220.427775] ? aa_af_perm+0x230/0x230 [ 1220.431579] ? nlmsg_notify+0x1f0/0x1f0 [ 1220.435549] ? kernel_recvmsg+0x220/0x220 [ 1220.439713] ? nlmsg_notify+0x1f0/0x1f0 [ 1220.443693] sock_sendmsg+0xc3/0x120 [ 1220.447409] ___sys_sendmsg+0x7bb/0x8e0 [ 1220.451393] ? copy_msghdr_from_user+0x440/0x440 [ 1220.456162] ? __fget+0x32f/0x510 [ 1220.459624] ? lock_downgrade+0x720/0x720 [ 1220.463765] ? check_preemption_disabled+0x41/0x280 [ 1220.468782] ? check_preemption_disabled+0x41/0x280 [ 1220.475526] ? __fget+0x356/0x510 [ 1220.478965] ? do_dup2+0x450/0x450 [ 1220.482489] ? lock_downgrade+0x720/0x720 [ 1220.486632] ? vfs_write+0x3d7/0x540 [ 1220.490333] ? __fdget+0x1d0/0x230 [ 1220.493863] __x64_sys_sendmsg+0x132/0x220 [ 1220.498091] ? __sys_sendmsg+0x1b0/0x1b0 [ 1220.502143] ? vfs_write+0x393/0x540 [ 1220.505871] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1220.512204] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1220.517220] ? do_syscall_64+0x21/0x620 [ 1220.521203] do_syscall_64+0xf9/0x620 [ 1220.525017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1220.530265] RIP: 0033:0x7f4ea6b3ca39 [ 1220.533961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.552843] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1220.560535] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1220.567787] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1220.575037] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.582289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1220.589540] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 11:00:02 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 9) [ 1220.666280] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1220.666280] 11:00:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a944, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 11:00:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000230000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1220.739947] FAULT_INJECTION: forcing a failure. [ 1220.739947] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.773814] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1220.791629] cramfs: empty filesystem [ 1220.817113] CPU: 1 PID: 2813 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1220.828635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.837998] Call Trace: [ 1220.840596] dump_stack+0x1fc/0x2ef [ 1220.844277] should_fail.cold+0xa/0xf [ 1220.848096] ? setup_fault_attr+0x200/0x200 [ 1220.852428] ? lock_acquire+0x170/0x3c0 [ 1220.856435] __should_failslab+0x115/0x180 [ 1220.860688] should_failslab+0x5/0x10 [ 1220.864512] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1220.869632] __kmalloc_node+0x38/0x70 [ 1220.873446] kvmalloc_node+0x61/0xf0 [ 1220.877175] alloc_netdev_mqs+0x831/0xd50 [ 1220.881338] rtnl_create_link+0x1d4/0xa40 [ 1220.885509] rtnl_newlink+0xf45/0x15c0 [ 1220.889421] ? rtnl_getlink+0x620/0x620 [ 1220.893421] ? mark_held_locks+0xf0/0xf0 [ 1220.897521] ? perf_trace_lock_acquire+0xef/0x530 [ 1220.902380] ? deref_stack_reg+0x134/0x1d0 [ 1220.906801] ? get_reg+0x176/0x1f0 [ 1220.910353] ? HARDIRQ_verbose+0x10/0x10 [ 1220.914425] ? is_bpf_text_address+0xd5/0x1b0 [ 1220.918936] ? lock_downgrade+0x720/0x720 [ 1220.923090] ? lock_acquire+0x170/0x3c0 [ 1220.927078] ? __bpf_address_lookup+0x330/0x330 [ 1220.931757] ? check_preemption_disabled+0x41/0x280 [ 1220.936783] ? is_bpf_text_address+0xfc/0x1b0 [ 1220.941290] ? kernel_text_address+0xbd/0xf0 [ 1220.945715] ? __kernel_text_address+0x9/0x30 [ 1220.950216] ? unwind_get_return_address+0x51/0x90 [ 1220.955153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1220.960518] ? __save_stack_trace+0xaf/0x190 [ 1220.964933] ? __lock_acquire+0x6de/0x3ff0 [ 1220.969356] ? __kasan_slab_free+0x186/0x1f0 [ 1220.973769] ? kmem_cache_free+0x7f/0x260 [ 1220.977926] ? kfree_skbmem+0xc1/0x140 [ 1220.981893] ? consume_skb+0x120/0x3d0 [ 1220.985786] ? mark_held_locks+0xf0/0xf0 [ 1220.989860] ? perf_trace_lock_acquire+0xef/0x530 [ 1220.994456] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1220.994456] [ 1220.994703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1220.994756] ? mutex_trylock+0x1a0/0x1a0 [ 1221.013456] ? check_preemption_disabled+0x41/0x280 [ 1221.018484] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1221.022917] ? rtnl_getlink+0x620/0x620 [ 1221.026917] rtnetlink_rcv_msg+0x453/0xb80 [ 1221.031166] ? rtnl_calcit.isra.0+0x430/0x430 [ 1221.035671] ? memcpy+0x35/0x50 [ 1221.038943] ? netdev_pick_tx+0x2f0/0x2f0 [ 1221.043080] ? __copy_skb_header+0x414/0x500 [ 1221.047470] ? kfree_skbmem+0x140/0x140 [ 1221.051446] netlink_rcv_skb+0x160/0x440 [ 1221.055490] ? rtnl_calcit.isra.0+0x430/0x430 [ 1221.059996] ? netlink_ack+0xae0/0xae0 [ 1221.063875] netlink_unicast+0x4d5/0x690 [ 1221.067919] ? netlink_sendskb+0x110/0x110 [ 1221.072137] ? _copy_from_iter_full+0x229/0x7c0 [ 1221.076787] ? __phys_addr_symbol+0x2c/0x70 [ 1221.081131] ? __check_object_size+0x17b/0x3e0 [ 1221.085702] netlink_sendmsg+0x6c3/0xc50 [ 1221.089755] ? aa_af_perm+0x230/0x230 [ 1221.093547] ? nlmsg_notify+0x1f0/0x1f0 [ 1221.097512] ? kernel_recvmsg+0x220/0x220 [ 1221.101672] ? nlmsg_notify+0x1f0/0x1f0 [ 1221.105633] sock_sendmsg+0xc3/0x120 [ 1221.109333] ___sys_sendmsg+0x7bb/0x8e0 [ 1221.113293] ? copy_msghdr_from_user+0x440/0x440 [ 1221.118053] ? __fget+0x32f/0x510 [ 1221.121501] ? lock_downgrade+0x720/0x720 [ 1221.125634] ? check_preemption_disabled+0x41/0x280 [ 1221.130632] ? check_preemption_disabled+0x41/0x280 [ 1221.135630] ? __fget+0x356/0x510 [ 1221.139076] ? do_dup2+0x450/0x450 [ 1221.142598] ? lock_downgrade+0x720/0x720 [ 1221.146740] ? vfs_write+0x3d7/0x540 [ 1221.150453] ? __fdget+0x1d0/0x230 [ 1221.153978] __x64_sys_sendmsg+0x132/0x220 [ 1221.158194] ? __sys_sendmsg+0x1b0/0x1b0 [ 1221.162249] ? vfs_write+0x393/0x540 [ 1221.165962] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1221.171321] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1221.176318] ? do_syscall_64+0x21/0x620 [ 1221.180275] do_syscall_64+0xf9/0x620 [ 1221.184070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1221.189240] RIP: 0033:0x7f4ea6b3ca39 [ 1221.192937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1221.211819] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1221.219596] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1221.226848] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1221.234101] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1221.241356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1221.248615] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 11:00:02 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d09, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 11:00:02 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d359c410000000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) 11:00:02 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 10) 11:00:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1221.337615] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1221.337615] 11:00:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a945, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) 11:00:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000003f0000001000000c0003000002000009000000002000000009", 0x26, 0x8000}, {0x0, 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}, {0x0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb800}, {&(0x7f0000011600)="00000000000000000000000000000000830002001200"/31, 0x1f}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b00000000200000000000000200000000000000010000000000000000", 0x31, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x7ff}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009004001", 0x1d, 0xf01000}], 0x0, &(0x7f0000064f00)) [ 1221.427723] FAULT_INJECTION: forcing a failure. [ 1221.427723] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.450542] CPU: 1 PID: 2843 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1221.458361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.467719] Call Trace: [ 1221.470317] dump_stack+0x1fc/0x2ef [ 1221.473965] should_fail.cold+0xa/0xf [ 1221.477771] ? setup_fault_attr+0x200/0x200 [ 1221.482098] ? lock_acquire+0x170/0x3c0 [ 1221.486099] __should_failslab+0x115/0x180 [ 1221.490347] should_failslab+0x5/0x10 [ 1221.494156] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1221.499270] __kmalloc_node+0x38/0x70 [ 1221.503083] kvmalloc_node+0x61/0xf0 [ 1221.506911] alloc_netdev_mqs+0x831/0xd50 [ 1221.511075] rtnl_create_link+0x1d4/0xa40 [ 1221.515240] rtnl_newlink+0xf45/0x15c0 [ 1221.519145] ? rtnl_getlink+0x620/0x620 [ 1221.523140] ? mark_held_locks+0xf0/0xf0 [ 1221.527208] ? perf_trace_lock_acquire+0xef/0x530 [ 1221.532051] ? deref_stack_reg+0x134/0x1d0 [ 1221.536295] ? get_reg+0x176/0x1f0 [ 1221.539845] ? HARDIRQ_verbose+0x10/0x10 [ 1221.543911] ? is_bpf_text_address+0xd5/0x1b0 [ 1221.548443] ? lock_downgrade+0x720/0x720 [ 1221.552691] ? lock_acquire+0x170/0x3c0 [ 1221.556668] ? __bpf_address_lookup+0x330/0x330 [ 1221.561862] ? check_preemption_disabled+0x41/0x280 [ 1221.566883] ? is_bpf_text_address+0xfc/0x1b0 [ 1221.571384] ? kernel_text_address+0xbd/0xf0 [ 1221.575848] ? __kernel_text_address+0x9/0x30 [ 1221.580347] ? unwind_get_return_address+0x51/0x90 [ 1221.585714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1221.591079] ? __save_stack_trace+0xaf/0x190 [ 1221.595500] ? __lock_acquire+0x6de/0x3ff0 [ 1221.599751] ? __kasan_slab_free+0x186/0x1f0 [ 1221.604164] ? kmem_cache_free+0x7f/0x260 [ 1221.608314] ? kfree_skbmem+0xc1/0x140 [ 1221.612218] ? consume_skb+0x120/0x3d0 [ 1221.616111] ? mark_held_locks+0xf0/0xf0 [ 1221.620188] ? perf_trace_lock_acquire+0xef/0x530 [ 1221.625040] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1221.630453] ? mutex_trylock+0x1a0/0x1a0 [ 1221.634522] ? check_preemption_disabled+0x41/0x280 [ 1221.639543] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1221.643976] ? rtnl_getlink+0x620/0x620 [ 1221.647980] rtnetlink_rcv_msg+0x453/0xb80 [ 1221.652224] ? rtnl_calcit.isra.0+0x430/0x430 [ 1221.656721] ? memcpy+0x35/0x50 [ 1221.660001] ? netdev_pick_tx+0x2f0/0x2f0 [ 1221.664147] ? __copy_skb_header+0x414/0x500 [ 1221.668563] ? kfree_skbmem+0x140/0x140 [ 1221.672552] netlink_rcv_skb+0x160/0x440 [ 1221.676620] ? rtnl_calcit.isra.0+0x430/0x430 [ 1221.681116] ? netlink_ack+0xae0/0xae0 [ 1221.685017] netlink_unicast+0x4d5/0x690 [ 1221.689088] ? netlink_sendskb+0x110/0x110 [ 1221.693366] ? _copy_from_iter_full+0x229/0x7c0 [ 1221.698045] ? __phys_addr_symbol+0x2c/0x70 [ 1221.702378] ? __check_object_size+0x17b/0x3e0 [ 1221.706974] netlink_sendmsg+0x6c3/0xc50 [ 1221.708712] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1221.711044] ? aa_af_perm+0x230/0x230 [ 1221.711060] ? nlmsg_notify+0x1f0/0x1f0 [ 1221.711072] ? kernel_recvmsg+0x220/0x220 [ 1221.711093] ? nlmsg_notify+0x1f0/0x1f0 [ 1221.711111] sock_sendmsg+0xc3/0x120 [ 1221.729558] cramfs: empty filesystem [ 1221.736542] ___sys_sendmsg+0x7bb/0x8e0 [ 1221.744235] ? copy_msghdr_from_user+0x440/0x440 [ 1221.749001] ? __fget+0x32f/0x510 [ 1221.752466] ? lock_downgrade+0x720/0x720 [ 1221.756618] ? check_preemption_disabled+0x41/0x280 [ 1221.761644] ? check_preemption_disabled+0x41/0x280 [ 1221.766675] ? __fget+0x356/0x510 [ 1221.770142] ? do_dup2+0x450/0x450 [ 1221.773693] ? lock_downgrade+0x720/0x720 11:00:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d359c1c0200000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1221.777944] ? vfs_write+0x3d7/0x540 [ 1221.781680] ? __fdget+0x1d0/0x230 [ 1221.785235] __x64_sys_sendmsg+0x132/0x220 [ 1221.789477] ? __sys_sendmsg+0x1b0/0x1b0 [ 1221.793634] ? vfs_write+0x393/0x540 [ 1221.797369] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1221.802741] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1221.807766] ? do_syscall_64+0x21/0x620 [ 1221.811748] do_syscall_64+0xf9/0x620 [ 1221.815566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1221.820759] RIP: 0033:0x7f4ea6b3ca39 [ 1221.824477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1221.843380] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1221.851099] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1221.858375] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1221.865650] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1221.872922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1221.880197] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 11:00:03 executing program 0: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x3d02, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) (fail_nth: 11) 11:00:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a7c7, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1221.956054] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1221.956054] 11:00:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x1a946, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xa00}]}}}]}, 0x3c}}, 0x0) [ 1222.049255] FAULT_INJECTION: forcing a failure. [ 1222.049255] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.079413] MTD: Attempt to mount non-MTD device "/dev/loop2" 11:00:03 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40a7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28002000000300000000000000436f6d7072657373656420524f4d46537d359c1c0300000006000000080000e3426f6df0726573736564000000000000c041", 0x42}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1222.099714] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1222.099714] [ 1222.101875] cramfs: empty filesystem [ 1222.129285] CPU: 1 PID: 2880 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1222.140806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.150337] Call Trace: [ 1222.152936] dump_stack+0x1fc/0x2ef [ 1222.156577] should_fail.cold+0xa/0xf [ 1222.160385] ? setup_fault_attr+0x200/0x200 [ 1222.164710] ? setup_fault_attr+0x200/0x200 [ 1222.169037] ? check_preemption_disabled+0x41/0x280 [ 1222.174057] __should_failslab+0x115/0x180 [ 1222.178296] should_failslab+0x5/0x10 [ 1222.182095] __kmalloc+0x6d/0x3c0 [ 1222.185637] ? batadv_hash_new+0x6f/0x290 [ 1222.189792] batadv_hash_new+0x6f/0x290 [ 1222.193948] batadv_originator_init+0x51/0x240 [ 1222.198542] batadv_mesh_init+0x46a/0x690 [ 1222.202701] batadv_softif_init_late+0xad7/0xd90 [ 1222.207464] ? batadv_get_strings+0x40/0x40 [ 1222.211799] ? batadv_get_strings+0x40/0x40 [ 1222.216129] register_netdevice+0x2dc/0x10f0 [ 1222.220555] ? unregister_netdev+0x20/0x20 [ 1222.224796] ? rtnl_create_link+0x145/0xa40 [ 1222.229127] rtnl_newlink+0x13b5/0x15c0 [ 1222.233113] ? rtnl_getlink+0x620/0x620 [ 1222.237106] ? mark_held_locks+0xf0/0xf0 [ 1222.241172] ? perf_trace_lock_acquire+0xef/0x530 [ 1222.246010] ? deref_stack_reg+0x134/0x1d0 [ 1222.250227] ? get_reg+0x176/0x1f0 [ 1222.253751] ? HARDIRQ_verbose+0x10/0x10 [ 1222.257923] ? is_bpf_text_address+0xd5/0x1b0 [ 1222.262481] ? lock_downgrade+0x720/0x720 [ 1222.266636] ? lock_acquire+0x170/0x3c0 [ 1222.270694] ? __bpf_address_lookup+0x330/0x330 [ 1222.275553] ? check_preemption_disabled+0x41/0x280 [ 1222.280568] ? is_bpf_text_address+0xfc/0x1b0 [ 1222.285098] ? kernel_text_address+0xbd/0xf0 [ 1222.289491] ? __kernel_text_address+0x9/0x30 [ 1222.293995] ? unwind_get_return_address+0x51/0x90 [ 1222.298909] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.304257] ? __save_stack_trace+0xaf/0x190 [ 1222.308691] ? __lock_acquire+0x6de/0x3ff0 [ 1222.312947] ? __kasan_slab_free+0x186/0x1f0 [ 1222.317365] ? kmem_cache_free+0x7f/0x260 [ 1222.321503] ? kfree_skbmem+0xc1/0x140 [ 1222.325368] ? consume_skb+0x120/0x3d0 [ 1222.329239] ? mark_held_locks+0xf0/0xf0 [ 1222.333287] ? perf_trace_lock_acquire+0xef/0x530 [ 1222.338118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.343600] ? mutex_trylock+0x1a0/0x1a0 [ 1222.347877] ? check_preemption_disabled+0x41/0x280 [ 1222.352900] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1222.357319] ? rtnl_getlink+0x620/0x620 [ 1222.361285] rtnetlink_rcv_msg+0x453/0xb80 [ 1222.365514] ? rtnl_calcit.isra.0+0x430/0x430 [ 1222.369998] ? memcpy+0x35/0x50 [ 1222.373311] ? netdev_pick_tx+0x2f0/0x2f0 [ 1222.377527] ? __copy_skb_header+0x414/0x500 [ 1222.381945] ? kfree_skbmem+0x140/0x140 [ 1222.385922] netlink_rcv_skb+0x160/0x440 [ 1222.389991] ? rtnl_calcit.isra.0+0x430/0x430 [ 1222.394502] ? netlink_ack+0xae0/0xae0 [ 1222.398390] netlink_unicast+0x4d5/0x690 [ 1222.402441] ? netlink_sendskb+0x110/0x110 [ 1222.406670] ? _copy_from_iter_full+0x229/0x7c0 [ 1222.411330] ? __phys_addr_symbol+0x2c/0x70 [ 1222.415653] ? __check_object_size+0x17b/0x3e0 [ 1222.420241] netlink_sendmsg+0x6c3/0xc50 [ 1222.424312] ? aa_af_perm+0x230/0x230 [ 1222.428114] ? nlmsg_notify+0x1f0/0x1f0 [ 1222.432076] ? kernel_recvmsg+0x220/0x220 [ 1222.436232] ? nlmsg_notify+0x1f0/0x1f0 [ 1222.440196] sock_sendmsg+0xc3/0x120 [ 1222.443950] ___sys_sendmsg+0x7bb/0x8e0 [ 1222.447938] ? copy_msghdr_from_user+0x440/0x440 [ 1222.452701] ? __fget+0x32f/0x510 [ 1222.456155] ? lock_downgrade+0x720/0x720 [ 1222.460295] ? check_preemption_disabled+0x41/0x280 [ 1222.465313] ? check_preemption_disabled+0x41/0x280 [ 1222.470318] ? __fget+0x356/0x510 [ 1222.473768] ? do_dup2+0x450/0x450 [ 1222.477290] ? lock_downgrade+0x720/0x720 [ 1222.481426] ? vfs_write+0x3d7/0x540 [ 1222.485127] ? __fdget+0x1d0/0x230 [ 1222.488712] __x64_sys_sendmsg+0x132/0x220 [ 1222.492942] ? __sys_sendmsg+0x1b0/0x1b0 [ 1222.496986] ? vfs_write+0x393/0x540 [ 1222.500694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1222.506047] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1222.511271] ? do_syscall_64+0x21/0x620 [ 1222.515337] do_syscall_64+0xf9/0x620 [ 1222.519143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.524327] RIP: 0033:0x7f4ea6b3ca39 [ 1222.528035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1222.546919] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1222.554625] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1222.561893] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1222.569156] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1222.576545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1222.583816] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 [ 1222.594315] ------------[ cut here ]------------ [ 1222.599101] ODEBUG: assert_init not available (active state 0) object type: timer_list hint: (null) [ 1222.609784] WARNING: CPU: 1 PID: 2880 at lib/debugobjects.c:325 debug_print_object+0x160/0x250 [ 1222.618542] Kernel panic - not syncing: panic_on_warn set ... [ 1222.618542] [ 1222.625932] CPU: 1 PID: 2880 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1222.633730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.643086] Call Trace: [ 1222.645686] dump_stack+0x1fc/0x2ef [ 1222.649327] panic+0x26a/0x50e [ 1222.652530] ? __warn_printk+0xf3/0xf3 [ 1222.656443] ? debug_print_object+0x160/0x250 [ 1222.661131] ? __probe_kernel_read+0x130/0x1b0 [ 1222.665719] ? __warn.cold+0x5/0x5a [ 1222.669355] ? debug_print_object+0x160/0x250 [ 1222.673893] __warn.cold+0x20/0x5a [ 1222.677442] ? debug_print_object+0x160/0x250 [ 1222.681943] report_bug+0x262/0x2b0 [ 1222.685585] do_error_trap+0x1d7/0x310 [ 1222.689487] ? math_error+0x310/0x310 [ 1222.693298] ? irq_work_claim+0xa6/0xc0 [ 1222.697280] ? irq_work_queue+0x29/0x80 [ 1222.701263] ? error_entry+0x72/0xd0 [ 1222.704987] ? trace_hardirqs_off_caller+0x2c/0x210 [ 1222.710014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1222.714881] invalid_op+0x14/0x20 [ 1222.718345] RIP: 0010:debug_print_object+0x160/0x250 [ 1222.723452] Code: dd 20 f1 b3 88 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bf 00 00 00 48 8b 14 dd 20 f1 b3 88 48 c7 c7 40 e5 b3 88 e8 65 92 7b 04 <0f> 0b 83 05 73 e6 af 07 01 48 83 c4 20 5b 5d 41 5c 41 5d c3 48 89 [ 1222.742357] RSP: 0018:ffff8881e844ec10 EFLAGS: 00010086 [ 1222.747720] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000000 [ 1222.754989] RDX: 0000000000040000 RSI: ffffffff814dff01 RDI: ffffed103d089d74 [ 1222.762264] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 1222.769540] R10: 0000000000000005 R11: ffffffff8c66505b R12: ffffffff89f90a40 [ 1222.776907] R13: ffffffff815313f0 R14: ffff888032b2e0c0 R15: 1ffff1103d089d8d [ 1222.784194] ? calc_wheel_index+0x230/0x230 [ 1222.788530] ? vprintk_func+0x81/0x180 [ 1222.792458] debug_object_assert_init+0x1f0/0x2e0 [ 1222.797312] ? debug_object_free+0x380/0x380 [ 1222.801730] ? mark_held_locks+0xf0/0xf0 [ 1222.805807] ? perf_trace_lock_acquire+0xef/0x530 [ 1222.810658] ? batadv_softif_init_late+0xad7/0xd90 [ 1222.815594] ? register_netdevice+0x2dc/0x10f0 [ 1222.820183] ? rtnl_newlink+0x13b5/0x15c0 [ 1222.824351] del_timer+0x6d/0x100 [ 1222.827810] ? run_timer_softirq+0x670/0x670 [ 1222.832256] ? batadv_tvlv_handler_get+0x314/0x470 [ 1222.837195] ? trace_hardirqs_off+0x64/0x200 [ 1222.841601] try_to_grab_pending+0x2b6/0x6f0 [ 1222.846018] __cancel_work_timer+0xa6/0x590 [ 1222.850334] ? try_to_grab_pending+0x6f0/0x6f0 [ 1222.854905] ? batadv_tvlv_handler_get+0x33b/0x470 [ 1222.859846] ? batadv_tvlv_handler_put+0x40/0x40 [ 1222.864612] ? mark_held_locks+0xa6/0xf0 [ 1222.868670] batadv_nc_mesh_free+0x41/0x120 [ 1222.872985] batadv_mesh_free+0x7d/0x170 [ 1222.877037] batadv_mesh_init+0x5b7/0x690 [ 1222.881205] batadv_softif_init_late+0xad7/0xd90 [ 1222.885958] ? batadv_get_strings+0x40/0x40 [ 1222.890272] ? batadv_get_strings+0x40/0x40 [ 1222.894588] register_netdevice+0x2dc/0x10f0 [ 1222.899001] ? unregister_netdev+0x20/0x20 [ 1222.903234] ? rtnl_create_link+0x145/0xa40 [ 1222.907548] rtnl_newlink+0x13b5/0x15c0 [ 1222.911511] ? rtnl_getlink+0x620/0x620 [ 1222.915478] ? mark_held_locks+0xf0/0xf0 [ 1222.919536] ? perf_trace_lock_acquire+0xef/0x530 [ 1222.924376] ? deref_stack_reg+0x134/0x1d0 [ 1222.928595] ? get_reg+0x176/0x1f0 [ 1222.932470] ? HARDIRQ_verbose+0x10/0x10 [ 1222.936518] ? is_bpf_text_address+0xd5/0x1b0 [ 1222.941087] ? lock_downgrade+0x720/0x720 [ 1222.945220] ? lock_acquire+0x170/0x3c0 [ 1222.949178] ? __bpf_address_lookup+0x330/0x330 [ 1222.953845] ? check_preemption_disabled+0x41/0x280 [ 1222.958910] ? is_bpf_text_address+0xfc/0x1b0 [ 1222.963400] ? kernel_text_address+0xbd/0xf0 [ 1222.967794] ? __kernel_text_address+0x9/0x30 [ 1222.972279] ? unwind_get_return_address+0x51/0x90 [ 1222.977311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.982694] ? __save_stack_trace+0xaf/0x190 [ 1222.987104] ? __lock_acquire+0x6de/0x3ff0 [ 1222.991357] ? __kasan_slab_free+0x186/0x1f0 [ 1222.995770] ? kmem_cache_free+0x7f/0x260 [ 1222.999925] ? kfree_skbmem+0xc1/0x140 [ 1223.003817] ? consume_skb+0x120/0x3d0 [ 1223.007704] ? mark_held_locks+0xf0/0xf0 [ 1223.011753] ? perf_trace_lock_acquire+0xef/0x530 [ 1223.016596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1223.021987] ? mutex_trylock+0x1a0/0x1a0 [ 1223.026122] ? check_preemption_disabled+0x41/0x280 [ 1223.031220] ? rtnetlink_rcv_msg+0x3a0/0xb80 [ 1223.035620] ? rtnl_getlink+0x620/0x620 [ 1223.039579] rtnetlink_rcv_msg+0x453/0xb80 [ 1223.043799] ? rtnl_calcit.isra.0+0x430/0x430 [ 1223.048281] ? memcpy+0x35/0x50 [ 1223.051565] ? netdev_pick_tx+0x2f0/0x2f0 [ 1223.055707] ? __copy_skb_header+0x414/0x500 [ 1223.060117] ? kfree_skbmem+0x140/0x140 [ 1223.064083] netlink_rcv_skb+0x160/0x440 [ 1223.068134] ? rtnl_calcit.isra.0+0x430/0x430 [ 1223.072614] ? netlink_ack+0xae0/0xae0 [ 1223.076492] netlink_unicast+0x4d5/0x690 [ 1223.080535] ? netlink_sendskb+0x110/0x110 [ 1223.084775] ? _copy_from_iter_full+0x229/0x7c0 [ 1223.089491] ? __phys_addr_symbol+0x2c/0x70 [ 1223.093803] ? __check_object_size+0x17b/0x3e0 [ 1223.098392] netlink_sendmsg+0x6c3/0xc50 [ 1223.102441] ? aa_af_perm+0x230/0x230 [ 1223.106235] ? nlmsg_notify+0x1f0/0x1f0 [ 1223.110215] ? kernel_recvmsg+0x220/0x220 [ 1223.114352] ? nlmsg_notify+0x1f0/0x1f0 [ 1223.118309] sock_sendmsg+0xc3/0x120 [ 1223.122002] ___sys_sendmsg+0x7bb/0x8e0 [ 1223.125961] ? copy_msghdr_from_user+0x440/0x440 [ 1223.130710] ? __fget+0x32f/0x510 [ 1223.134162] ? lock_downgrade+0x720/0x720 [ 1223.138300] ? check_preemption_disabled+0x41/0x280 [ 1223.143346] ? check_preemption_disabled+0x41/0x280 [ 1223.148353] ? __fget+0x356/0x510 [ 1223.151792] ? do_dup2+0x450/0x450 [ 1223.155320] ? lock_downgrade+0x720/0x720 [ 1223.159483] ? vfs_write+0x3d7/0x540 [ 1223.163231] ? __fdget+0x1d0/0x230 [ 1223.166759] __x64_sys_sendmsg+0x132/0x220 [ 1223.170982] ? __sys_sendmsg+0x1b0/0x1b0 [ 1223.175070] ? vfs_write+0x393/0x540 [ 1223.178776] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1223.184125] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1223.189123] ? do_syscall_64+0x21/0x620 [ 1223.193080] do_syscall_64+0xf9/0x620 [ 1223.196865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1223.202039] RIP: 0033:0x7f4ea6b3ca39 [ 1223.205742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.224671] RSP: 002b:00007f4ea40b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1223.232375] RAX: ffffffffffffffda RBX: 00007f4ea6c3ff60 RCX: 00007f4ea6b3ca39 [ 1223.239638] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 1223.246904] RBP: 00007f4ea40b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1223.254593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1223.261847] R13: 00007ffdf6ac989f R14: 00007f4ea40b2300 R15: 0000000000022000 [ 1223.269828] Kernel Offset: disabled [ 1223.273454] Rebooting in 86400 seconds..