ff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x25b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x700b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 374.186856][T19732] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:07 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 374.266430][T19716] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 374.321004][T19706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x700c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 374.423920][T19732] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 374.500516][T19706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x700d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:07 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:07 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x25b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 374.843238][T19795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 374.920029][T19787] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:07 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7010}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 375.004956][T19805] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a"]}, 0x27d) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 375.175986][T19821] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:08 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:03:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:08 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:08 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:08 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:03:08 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 376.183394][T19879] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:09 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:09 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 376.421283][T19898] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:03:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:09 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:09 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x216, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x28e) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 376.834072][T19933] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:09 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 376.968098][T19957] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7106}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:09 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x216, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x28e) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7107}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7108}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:09 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7b00}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 377.345855][T19994] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:10 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x216, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x28e) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:10 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:10 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7b01}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 377.636311][T20022] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:10 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:10 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x7d06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x21f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x297) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8002}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 377.956445][T20070] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:10 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x21f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x297) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 378.119933][T20060] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:10 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:10 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8003}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 378.360978][T20113] __nla_parse: 47 callbacks suppressed [ 378.360989][T20113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8004}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:11 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 378.555044][T20113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:11 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:11 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x21f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda6"]}, 0x297) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 378.615328][T20130] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 378.646525][T20113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8005}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:11 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 378.915752][T20130] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8006}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:11 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x223, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:11 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 379.066862][T20167] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:11 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 379.139330][T20172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8007}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 379.308861][T20181] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 379.322861][T20167] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:12 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x223, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6"]}, 0x29b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 379.416281][T20167] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) socket(0x0, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:12 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8008}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 379.541250][T20203] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:12 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 379.747531][T20225] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:12 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x223, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) socket(0x0, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:12 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 379.914895][T20232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 379.972660][T20242] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x800a}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 380.017938][T20225] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:12 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x800b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 380.183829][T20269] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:12 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) socket(0x0, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:12 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x225, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e7"]}, 0x29d) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x800c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x800d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:13 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 380.501539][T20298] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:13 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:13 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x225, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29d) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:13 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:13 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 380.724097][T20328] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:13 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:13 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x225, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29d) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:13 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:13 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:13 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 381.144341][T20366] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:14 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x226, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29e) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 381.335605][T20394] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:14 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8106}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:14 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 381.684460][T20434] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8107}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:14 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x226, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c"]}, 0x29e) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8108}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:14 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 381.995240][T20466] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:14 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x226, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29e) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8b00}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:15 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8b01}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 382.383907][T20504] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:15 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:15 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x8d06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 382.710758][T20538] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:15 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}], 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:15 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:15 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:15 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x2, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 383.127810][T20577] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9000}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:15 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}], 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:15 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9001}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}], 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 383.466161][T20601] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:16 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:16 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x3, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\xff', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:16 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9002}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 383.835431][T20639] __nla_parse: 66 callbacks suppressed [ 383.835443][T20639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {0x0}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 383.881499][T20653] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9003}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:16 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 384.030399][T20639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:16 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 384.167598][T20653] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:17 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9004}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {0x0}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 384.380745][T20687] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:17 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:17 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9005}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 384.599015][T20714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 384.609187][T20709] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 384.684941][T20726] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:17 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {0x0}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:17 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9006}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 384.764899][T20714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 384.936211][T20726] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 385.033496][T20753] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9007}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:17 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:17 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 385.183417][T20747] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:17 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x5, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9008}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 385.383893][T20791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 385.438482][T20791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 385.467308][T20801] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:18 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:18 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x900a}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:18 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 385.664949][T20820] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x900b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:18 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:18 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x900c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:18 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x7, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x900d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:18 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 386.050903][T20865] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:18 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 386.204707][T20883] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:18 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x8, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:19 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:19 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:19 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xa, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 386.536793][T20921] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:19 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:19 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:19 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 386.890187][T20959] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:19 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xc, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 387.124854][T20984] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:19 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:19 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:20 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xe, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:20 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:20 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 387.494074][T21009] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:20 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x10, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9106}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 387.718613][T21031] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:20 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:20 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9107}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:20 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x14, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 388.172529][T21070] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9108}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 388.377540][T21096] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:21 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x2a, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9b00}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9b01}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:21 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:21 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:21 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x48, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 388.737307][T21121] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9d06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 388.881486][T21138] __nla_parse: 35 callbacks suppressed [ 388.881497][T21138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 388.979696][T21143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:21 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:21 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 389.064907][T21155] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa000}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:21 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4c, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 389.276962][T21186] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa001}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:22 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) [ 389.333662][T21192] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 389.345299][T21183] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:22 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 389.561895][T21186] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa002}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:22 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x60, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 389.678481][T21223] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:22 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 389.801085][T21234] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:22 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) [ 389.882546][T21236] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 389.926461][T21234] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa003}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 390.030620][T21234] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 390.093574][T21254] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:22 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:22 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa004}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:22 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x68, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 390.280964][T21272] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 390.381106][T21288] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:23 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa005}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:23 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) [ 390.564911][T21306] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:23 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:23 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6c, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:23 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa006}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:23 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0x9d06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:23 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x74, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 391.009095][T21341] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:23 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa007}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:23 executing program 4: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa008}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 391.337692][T21369] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:24 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x7a, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) socket(0x0, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:24 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 391.649148][T21409] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa00a}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:24 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x300, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:24 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x25b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 391.905945][T21433] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa00b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:24 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x500, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:24 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 392.160022][T21454] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa00c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:25 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x600, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:25 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x25b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 392.385266][T21478] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:25 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa00d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:25 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b3794"]}, 0x25b) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:25 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x700, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 392.795356][T21520] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:25 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:25 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:25 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 393.087659][T21547] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:25 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:25 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x940, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:26 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080)}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 393.406662][T21582] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:26 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:26 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xa00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:26 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:26 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080)}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 393.745292][T21596] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:26 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xc00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:26 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 394.058190][T21644] __nla_parse: 36 callbacks suppressed [ 394.058200][T21644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 394.080880][T21637] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:26 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080)}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:26 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 394.198170][T21649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 394.291495][T21644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 394.301627][T21655] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:27 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xe00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa106}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xe0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:27 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[]}, 0x78) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 394.634597][T21695] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 394.733886][T21702] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 394.745792][T21707] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa107}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 394.921512][T21695] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:27 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[]}, 0x78) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 394.973238][T21702] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 394.986177][T21707] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x268, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xa108}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:28 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xe50, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 395.330961][T21749] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:28 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[]}, 0x78) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xab00}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 395.555541][T21767] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 395.609149][T21773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:28 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:28 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB]}, 0x78) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 395.702446][T21780] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xab01}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 395.845818][T21773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xad06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 395.986218][T21811] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:28 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xec0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:28 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:28 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB]}, 0x78) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 396.199213][T21806] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb000}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x3f0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:29 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x1400, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb001}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:29 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:29 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 396.614725][T21869] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:29 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB]}, 0x78) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb002}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:29 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x2000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 396.872053][T21889] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:29 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:29 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb003}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:30 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x2a00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 397.361222][T21931] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:30 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x114, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c415353494659000000000000000000000000"]}, 0x18c) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb004}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:30 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:30 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x3f00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:30 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:30 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x114, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x18c) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb005}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 397.953619][T21979] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:30 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4009, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:30 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb006}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:30 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:31 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x114, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x18c) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 398.353039][T22013] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb007}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:31 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4800, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb008}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:31 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x19e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d9"]}, 0x216) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:31 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 398.795139][T22056] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 399.044568][T22081] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:31 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4c00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:31 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 399.256744][T22104] __nla_parse: 25 callbacks suppressed [ 399.256754][T22104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:32 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x19e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d9"]}, 0x216) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 399.375910][T22104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb00a}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 399.586692][T22104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:32 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x19e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x216) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 399.685465][T22116] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 399.712167][T22133] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:32 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb00b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 400.085975][T22133] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:32 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x500e, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:32 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x25b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:32 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb00c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 400.274889][T22172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 400.390582][T22180] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:33 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb00d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 400.535723][T22193] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:33 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x25b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 400.749716][T22172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:33 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 400.905831][T22193] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:33 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:33 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x5865, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:33 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:33 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1e3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x25b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 401.217879][T22247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:34 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 401.314898][T22257] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 401.388774][T22259] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:34 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:34 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:34 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 401.593983][T22259] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 401.624586][T22247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:34 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:34 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:34 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:34 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}], 0x1) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:34 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 402.086554][T22324] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:34 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6558, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 402.208482][T22324] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:34 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:35 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x205, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x27d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xf23, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:35 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6800, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 402.787741][T22376] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:35 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:35 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x216, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x28e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:35 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 403.172858][T22415] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb106}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:36 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6c00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:36 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb107}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:36 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x216, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x28e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:36 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xb108}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:36 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 403.857812][T22457] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:36 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x7400, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xbb00}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:36 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:36 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x216, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x28e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 404.214443][T22485] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xbd06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:37 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x7a00, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:37 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:37 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x21f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda6"]}, 0x297) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:37 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 404.630580][T22529] __nla_parse: 17 callbacks suppressed [ 404.630591][T22529] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 404.670547][T22521] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc000}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 404.793929][T22544] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:37 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x21f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x297) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:37 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc001}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 405.010898][T22529] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:37 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) socket(0x0, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 405.199179][T22565] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:37 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x21f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x297) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:38 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x8100, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc002}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:38 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 405.381766][T22591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 405.416072][T22591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 405.490708][T22598] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 405.506286][T22591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:38 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc003}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:38 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:38 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x223, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:38 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xc00e, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 405.771287][T22629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 405.821265][T22632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc004}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:38 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 405.904254][T22629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:38 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 406.054636][T22632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 406.065263][T22645] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc005}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:38 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x40000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 406.208056][T22645] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:39 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x223, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6"]}, 0x29b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:39 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc006}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x230f, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:39 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:39 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:39 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x1000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:39 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x223, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6"]}, 0x29b) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc007}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 406.670924][T22706] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:39 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x225, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e7"]}, 0x29d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:39 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:39 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x2000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc008}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:39 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 407.196194][T22760] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:39 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x800000000007f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000400)=0x0) fcntl$setown(r2, 0x8, r5) sendfile(r3, r4, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x30a6c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 01:03:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:40 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x225, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:40 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x3000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 407.424117][T22783] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:40 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc00a}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:40 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x225, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e7"]}, 0x29d) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:40 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc00b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 407.880291][T22819] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:40 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:40 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x226, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 408.203232][T22847] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 408.785152][T22873] EXT4-fs (sda1): re-mounted. Opts: (null) 01:03:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 01:03:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc00c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:41 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x5000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:41 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:41 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x226, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 409.015258][T22892] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc00d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:41 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:41 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:41 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x226, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 409.274024][T22923] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x10000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) fstat(0xffffffffffffffff, 0x0) 01:03:42 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc00f}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:42 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x7000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:42 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) close(r0) add_key(&(0x7f0000000000)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) 01:03:42 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 409.712785][T22963] __nla_parse: 24 callbacks suppressed [ 409.712794][T22963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 409.736221][T22961] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:42 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:42 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 409.856023][T22963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) kexec_load(0x5050ca01000000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x9e945000, 0x3e0000}], 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, &(0x7f0000000440)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") [ 409.957197][T22963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 410.025885][T22981] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:42 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 410.127149][T22986] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 01:03:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:42 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:43 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:43 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x7fffd}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 410.449491][T23017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 410.530306][T23026] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 410.567266][T23025] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:43 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:43 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:43 executing program 4: r0 = open(&(0x7f0000000080)='./file1\x00', 0x400040, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) close(r0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe1f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) [ 410.815305][T23017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 410.829213][T23026] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:43 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe48, 0x20000000, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40000008, 0x0) close(r1) sendto$packet(r3, &(0x7f00000004c0)="b5d349544d3fdf92d4567a5da58223f37f80000076f4742c2aeea90889a25e631c8a8119ab420509008e71ffda6c7f448a3dd77e384a216710d210f7e662fe19b99a2adc1626f7ed614514172815376a3ca471e0e84c2d8b28ec5ce5a63e64c92a6647846f7340a96f13c90f8a50bda82c8620a2d64a5183786c6cf3ea136c0146c354ea67f48ac4f98bb9e08cf241a62759dce89f3281a99c1b634086f468ce7016a65f250ccc46e66d01a896852ef6ea4cde09206e456112865bd90e54a42a466df686247cb979c8b8ba58361d172b886c7369b9bb21d4cae9e75fedcccd594b58c0064618303bb1d00c2b7d999f94d4abd5db37617011e06c656094fda35158701c5f7fa3c88cb321ef01f4175b9a9d4f8b738733e6d02fb3b75dd6d14ee31e2e246b6d9c663f86b3cae1c21ce9d52a3f70", 0x133, 0x811, 0x0, 0x0) 01:03:43 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xa000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 411.130265][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:03:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:43 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:43 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 411.311816][T23084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 411.405394][T23091] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 411.426773][T23084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 411.619870][T23084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:44 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:44 executing program 2: arch_prctl$ARCH_GET_CPUID(0x1011) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000002940), 0x3a3, 0x0) 01:03:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6802, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:44 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xc000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc106}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 411.987164][T23134] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 412.242313][T23147] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:46 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0xffd8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f0000000200)="8432de3b52ece64e2158093ecb5769c9f7", 0x11, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000004, 0x113, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:03:46 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:46 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xe000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc107}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x3a, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff87, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x2], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 414.100883][T23167] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:46 executing program 2: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x0) open$dir(0x0, 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) write$apparmor_exec(r0, &(0x7f00000002c0)={'stack ', '::\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9d0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x86\xc6uu\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3\x18\xfe\x02\xa9\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0xe6) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setpriority(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@initdev, 0x0, 0x0, 0xff, 0x0, 0x2, 0xe9dc}, &(0x7f0000000340)=0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 01:03:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc108}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:46 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x10000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:46 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xcb00}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 414.351238][T23194] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)=r0) 01:03:47 executing program 4: 01:03:47 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x14000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xcd06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:47 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:47 executing program 2: 01:03:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:47 executing program 2: [ 415.013621][T23228] __nla_parse: 8 callbacks suppressed [ 415.013632][T23228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 415.058675][T23225] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:47 executing program 4: 01:03:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd000}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:47 executing program 2: 01:03:47 executing program 4: [ 415.201674][T23237] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 415.230691][T23243] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:47 executing program 2: 01:03:48 executing program 4: [ 415.351722][T23228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:48 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x20000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd001}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:48 executing program 2: 01:03:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:48 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:48 executing program 4: 01:03:48 executing program 4: 01:03:48 executing program 2: [ 415.626235][T23275] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd002}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 415.695394][T23286] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 415.771592][T23291] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:48 executing program 4: 01:03:48 executing program 2: 01:03:48 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 415.816107][T23286] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 415.904320][T23286] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:48 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x2a000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd003}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:48 executing program 4: 01:03:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:48 executing program 2: 01:03:48 executing program 4: 01:03:48 executing program 2: [ 416.234678][T23319] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:49 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 416.322620][T23333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd004}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:49 executing program 4: [ 416.398189][T23340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:49 executing program 2: [ 416.496800][T23343] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 416.539900][T23333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:49 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 416.633651][T23340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:49 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r1, 0x89e0, 0x0) 01:03:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 01:03:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd005}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:49 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 416.988043][ T26] audit: type=1326 audit(1553389429.670:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23373 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 417.020338][T23381] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) fstat(r1, &(0x7f00000001c0)) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) fchown(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) accept(r1, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 01:03:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd006}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:49 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x40090000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 417.252674][T23404] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd007}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd008}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:50 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 417.734873][ T26] audit: type=1326 audit(1553389430.410:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23373 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 01:03:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xf003, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd00a}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 418.386292][T23406] device team0 entered promiscuous mode [ 418.436002][T23406] device team_slave_0 entered promiscuous mode [ 418.496282][T23406] device team_slave_1 entered promiscuous mode [ 418.516727][T23406] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.550282][T23461] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 418.618408][T23437] device team0 left promiscuous mode [ 418.624186][T23437] device team_slave_0 left promiscuous mode [ 418.630766][T23437] device team_slave_1 left promiscuous mode 01:03:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) 01:03:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:51 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x48000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:51 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd00b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:51 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 418.852569][T23460] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd00c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:51 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4c000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:51 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 419.178959][T23500] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd00d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 419.370463][T23523] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:52 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:52 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x500e0000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:52 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xc105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:52 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x60000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 419.708192][T23552] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(0xffffffffffffffff, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:52 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:52 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:52 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x65580000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(0xffffffffffffffff, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:52 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 419.947689][T23579] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(0xffffffffffffffff, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 420.136579][T23575] __nla_parse: 23 callbacks suppressed [ 420.136589][T23575] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:52 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:53 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 420.268107][T23611] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:53 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:53 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x68000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:53 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 420.479005][T23636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 420.555561][T23629] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue [ 420.576236][T23636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/24) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000140)="ef96b5bad67319db73ad947ab05ea598b44ac6ea8744291cd6b00681e2c569a1bee5a78fff16bec525d18f1802c21c0632149e5926f9d4ffdb58f7642ed52e5fabb8c87b381b8fe05cbc82881b9d68b998a1877cd30d2796f048a701a155ad40e2d03e9aca7964814001d1016f84130076c40c914eb66f118db599b5b10ae00c8f179ad724"}, {&(0x7f0000000200)="d64de0cc3e3f106aee8f1fe504b3d48b45d1cb79225f0df792c60adec5e4fed1876274b98944854735431804a97574f15ffddc57f9f79f7baa49b7d84f480a7ab799445861d1732af4caa9774f339f237007810c009be9d277cfc312825b3fa48b06c7a6b0dba82b714f17d1fc3a5a3aa10d25e15505a85a6706080da98a47b0de8cf713a04ee020efd4d0f366346a167b408368ffd4be6ae112"}, {&(0x7f00000002c0)="3d3a56bc525386a4dba5e4b76c5b00f41b976e781884a9b71587cc337996e38c818944bce99b831b2eec08cfbbb3a11f6eb3c54f8b67dd13255fce1e52a290c6e314b002ea9f862e7f7d21705f6462071c3072"}, {&(0x7f0000000340)="8010bf408303d8d2f5e1076f18b51f6851d2abe5f95526ac4c4f109545ef51703736e2597fbae97fec3e732c21055e324be49fe84eb6ac8d2cd9ece1f30bfa8addccc7ed913a9910afa4f687d465b4d43fba2b76090be18f7240aaee5401816486153d943d342fff5547aa1a270c47a994dad9ac59e1a2d526688dbcd8de409f0055eea15a11f42e9290d9dfa4f61f701625be2c4cba2067db73ee99b0f81c0d63f2dc15b1f129ffcdea012ac13f7d6e0d0892d169a2b9353649fac64032b9753ea2ea96338196ed1cc80d7e55ff73ce07"}, {&(0x7f0000000080)="e3ba"}], 0x1000000000000103) 01:03:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:53 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 420.622163][T23636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 420.655586][T23648] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/24) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000140)="ef96b5bad67319db73ad947ab05ea598b44ac6ea8744291cd6b00681e2c569a1bee5a78fff16bec525d18f1802c21c0632149e5926f9d4ffdb58f7642ed52e5fabb8c87b381b8fe05cbc82881b9d68b998a1877cd30d2796f048a701a155ad40e2d03e9aca7964814001d1016f84130076c40c914eb66f118db599b5b10ae00c8f179ad724"}, {&(0x7f0000000200)="d64de0cc3e3f106aee8f1fe504b3d48b45d1cb79225f0df792c60adec5e4fed1876274b98944854735431804a97574f15ffddc57f9f79f7baa49b7d84f480a7ab799445861d1732af4caa9774f339f237007810c009be9d277cfc312825b3fa48b06c7a6b0dba82b714f17d1fc3a5a3aa10d25e15505a85a6706080da98a47b0de8cf713a04ee020efd4d0f366346a167b408368ffd4be6ae112"}, {&(0x7f00000002c0)="3d3a56bc525386a4dba5e4b76c5b00f41b976e781884a9b71587cc337996e38c818944bce99b831b2eec08cfbbb3a11f6eb3c54f8b67dd13255fce1e52a290c6e314b002ea9f862e7f7d21705f6462071c3072"}, {&(0x7f0000000340)="8010bf408303d8d2f5e1076f18b51f6851d2abe5f95526ac4c4f109545ef51703736e2597fbae97fec3e732c21055e324be49fe84eb6ac8d2cd9ece1f30bfa8addccc7ed913a9910afa4f687d465b4d43fba2b76090be18f7240aaee5401816486153d943d342fff5547aa1a270c47a994dad9ac59e1a2d526688dbcd8de409f0055eea15a11f42e9290d9dfa4f61f701625be2c4cba2067db73ee99b0f81c0d63f2dc15b1f129ffcdea012ac13f7d6e0d0892d169a2b9353649fac64032b9753ea2ea96338196ed1cc80d7e55ff73ce07"}, {&(0x7f0000000080)="e3ba"}], 0x1000000000000103) 01:03:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 420.812191][T23663] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:53 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:53 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x6c000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/24) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000140)="ef96b5bad67319db73ad947ab05ea598b44ac6ea8744291cd6b00681e2c569a1bee5a78fff16bec525d18f1802c21c0632149e5926f9d4ffdb58f7642ed52e5fabb8c87b381b8fe05cbc82881b9d68b998a1877cd30d2796f048a701a155ad40e2d03e9aca7964814001d1016f84130076c40c914eb66f118db599b5b10ae00c8f179ad724"}, {&(0x7f0000000200)="d64de0cc3e3f106aee8f1fe504b3d48b45d1cb79225f0df792c60adec5e4fed1876274b98944854735431804a97574f15ffddc57f9f79f7baa49b7d84f480a7ab799445861d1732af4caa9774f339f237007810c009be9d277cfc312825b3fa48b06c7a6b0dba82b714f17d1fc3a5a3aa10d25e15505a85a6706080da98a47b0de8cf713a04ee020efd4d0f366346a167b408368ffd4be6ae112"}, {&(0x7f00000002c0)="3d3a56bc525386a4dba5e4b76c5b00f41b976e781884a9b71587cc337996e38c818944bce99b831b2eec08cfbbb3a11f6eb3c54f8b67dd13255fce1e52a290c6e314b002ea9f862e7f7d21705f6462071c3072"}, {&(0x7f0000000340)="8010bf408303d8d2f5e1076f18b51f6851d2abe5f95526ac4c4f109545ef51703736e2597fbae97fec3e732c21055e324be49fe84eb6ac8d2cd9ece1f30bfa8addccc7ed913a9910afa4f687d465b4d43fba2b76090be18f7240aaee5401816486153d943d342fff5547aa1a270c47a994dad9ac59e1a2d526688dbcd8de409f0055eea15a11f42e9290d9dfa4f61f701625be2c4cba2067db73ee99b0f81c0d63f2dc15b1f129ffcdea012ac13f7d6e0d0892d169a2b9353649fac64032b9753ea2ea96338196ed1cc80d7e55ff73ce07"}, {&(0x7f0000000080)="e3ba"}], 0x1000000000000103) 01:03:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 420.976110][T23679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 421.052249][T23683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd106}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:53 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:53 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 421.216374][T23679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:54 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 421.312751][T23701] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd107}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 421.358130][T23683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:54 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x74000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:54 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:54 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xd108}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 421.625958][T23701] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue [ 421.657552][T23735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xdb00}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:54 executing program 4 (fault-call:11 fault-nth:0): openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 421.899014][T23752] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:54 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x7a000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:54 executing program 5 (fault-call:4 fault-nth:0): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xdd06}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 422.115308][T23775] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 422.212321][T23784] FAULT_INJECTION: forcing a failure. [ 422.212321][T23784] name failslab, interval 1, probability 0, space 0, times 0 [ 422.241275][T23784] CPU: 1 PID: 23784 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 422.250791][T23784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.250803][T23784] Call Trace: [ 422.264284][T23784] dump_stack+0x172/0x1f0 [ 422.268644][T23784] should_fail.cold+0xa/0x15 [ 422.273255][T23784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 422.273280][T23784] ? ___might_sleep+0x163/0x280 [ 422.284634][T23784] __should_failslab+0x121/0x190 [ 422.289605][T23784] should_failslab+0x9/0x14 [ 422.294478][T23784] kmem_cache_alloc_node_trace+0x270/0x720 [ 422.300948][T23784] ? mutex_trylock+0x1e0/0x1e0 [ 422.305830][T23784] __kmalloc_node+0x3d/0x70 [ 422.310629][T23784] kvmalloc_node+0x68/0x100 [ 422.315347][T23784] alloc_netdev_mqs+0x98/0xd30 [ 422.320345][T23784] ? sl_free_netdev+0x70/0x70 [ 422.325011][T23784] slip_open+0x38e/0x1138 [ 422.329333][T23784] ? sl_uninit+0x20/0x20 [ 422.334094][T23784] ? lock_downgrade+0x880/0x880 [ 422.339024][T23784] ? sl_uninit+0x20/0x20 [ 422.343393][T23784] tty_ldisc_open.isra.0+0x8b/0xe0 [ 422.348669][T23784] tty_set_ldisc+0x2d7/0x690 [ 422.353275][T23784] tty_ioctl+0xe69/0x14d0 [ 422.357697][T23784] ? tty_register_device+0x40/0x40 [ 422.363083][T23784] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 422.369714][T23784] ? tomoyo_init_request_info+0x105/0x1d0 [ 422.375655][T23784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.381883][T23784] ? tomoyo_path_number_perm+0x263/0x520 [ 422.387855][T23784] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 422.393738][T23784] ? __lockdep_free_key_range+0x120/0x120 [ 422.400525][T23784] ? __fget+0x35a/0x550 [ 422.404845][T23784] ? tty_register_device+0x40/0x40 [ 422.410086][T23784] do_vfs_ioctl+0xd6e/0x1390 [ 422.414907][T23784] ? ioctl_preallocate+0x210/0x210 [ 422.420260][T23784] ? smack_file_ioctl+0x196/0x310 [ 422.425465][T23784] ? smack_inode_rename+0x2d0/0x2d0 [ 422.431012][T23784] ? fput_many+0x12c/0x1a0 [ 422.435516][T23784] ? tomoyo_file_ioctl+0x23/0x30 [ 422.440661][T23784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.446946][T23784] ? security_file_ioctl+0x93/0xc0 [ 422.453645][T23784] ksys_ioctl+0xab/0xd0 [ 422.457888][T23784] __x64_sys_ioctl+0x73/0xb0 [ 422.462569][T23784] do_syscall_64+0x103/0x610 [ 422.467326][T23784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.473293][T23784] RIP: 0033:0x458209 [ 422.477177][T23784] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.497397][T23784] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:03:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:55 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29e) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe000}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 422.506661][T23784] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 422.514966][T23784] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 422.523230][T23784] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 422.531487][T23784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 422.539805][T23784] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 01:03:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:55 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x4, 0x3ff, 0x1, 0x6, 0x6, [{0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x8, 0x9, 0x0, 0x0, 0x0, 0x1203}, {0x100, 0x1, 0x3}, {0xfffffffffffffffb, 0x1, 0x2, 0x0, 0x0, 0x4}, {0x5, 0xc5, 0x1f, 0x0, 0x0, 0x4}, {0x4, 0x844e, 0x6, 0x0, 0x0, 0x204}]}) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001880)=ANY=[@ANYBLOB="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"]}, 0x2f7) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:55 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x81000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe001}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 422.761748][T23804] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:55 executing program 5 (fault-call:4 fault-nth:1): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:55 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) r2 = fcntl$dupfd(r1, 0x406, r0) write$tun(r2, &(0x7f0000000140)={@val={0x0, 0x8af9}, @void, @llc={@snap={0xab, 0x1, 'F.', "e1f3d2", 0x0, "85e985736b68514968ba83d2278784f3108fdbe025548dd7f626a5c9056fa2d4f670d00e248442126a5fe3fe32be855a8ed627a9fb149a26f44b0d2e386b0c08819d74cd00e39d67ab69cd52b32bd5e793cbb582f47339869aeab3a1b2aec918ff076faee97e5ddd0136ed1a68f7d38ff5afaaa30744f0dae018ea732ad9d9095bfe993b763d746f4859169c8cf1c9779cdb"}}}, 0x9f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:55 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x88a8ffff, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe002}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe003}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 423.024126][T23839] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:55 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001880)=ANY=[@ANYBLOB="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"]}, 0x2cc) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:55 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xc00e0000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 423.128857][T23851] FAULT_INJECTION: forcing a failure. [ 423.128857][T23851] name failslab, interval 1, probability 0, space 0, times 0 01:03:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 423.173127][T23851] CPU: 0 PID: 23851 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 423.181161][T23851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.191426][T23851] Call Trace: [ 423.194742][T23851] dump_stack+0x172/0x1f0 [ 423.199189][T23851] should_fail.cold+0xa/0x15 [ 423.203889][T23851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 423.209810][T23851] __should_failslab+0x121/0x190 [ 423.214857][T23851] should_failslab+0x9/0x14 [ 423.219377][T23851] kmem_cache_alloc_trace+0x4b/0x760 [ 423.225114][T23851] __hw_addr_create_ex+0x5e/0x310 [ 423.230250][T23851] __hw_addr_add_ex+0x1ef/0x2b0 [ 423.235272][T23851] dev_addr_init+0x118/0x200 [ 423.239880][T23851] ? dev_mc_flush+0x40/0x40 [ 423.244687][T23851] ? __kmalloc_node+0x4e/0x70 [ 423.249477][T23851] alloc_netdev_mqs+0x142/0xd30 [ 423.254951][T23851] ? sl_free_netdev+0x70/0x70 [ 423.259821][T23851] slip_open+0x38e/0x1138 [ 423.264279][T23851] ? sl_uninit+0x20/0x20 [ 423.268977][T23851] ? lock_downgrade+0x880/0x880 [ 423.273866][T23851] ? sl_uninit+0x20/0x20 [ 423.278250][T23851] tty_ldisc_open.isra.0+0x8b/0xe0 [ 423.283382][T23851] tty_set_ldisc+0x2d7/0x690 [ 423.288082][T23851] tty_ioctl+0xe69/0x14d0 [ 423.292702][T23851] ? tty_register_device+0x40/0x40 [ 423.297979][T23851] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 423.304509][T23851] ? tomoyo_init_request_info+0x105/0x1d0 [ 423.310240][T23851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.316778][T23851] ? tomoyo_path_number_perm+0x263/0x520 [ 423.322830][T23851] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 423.328826][T23851] ? __lockdep_free_key_range+0x120/0x120 [ 423.334647][T23851] ? __fget+0x35a/0x550 [ 423.339107][T23851] ? tty_register_device+0x40/0x40 [ 423.344539][T23851] do_vfs_ioctl+0xd6e/0x1390 [ 423.349703][T23851] ? ioctl_preallocate+0x210/0x210 [ 423.354987][T23851] ? smack_file_ioctl+0x196/0x310 [ 423.360030][T23851] ? smack_inode_rename+0x2d0/0x2d0 [ 423.365545][T23851] ? fput_many+0x12c/0x1a0 [ 423.370052][T23851] ? tomoyo_file_ioctl+0x23/0x30 [ 423.375443][T23851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.381692][T23851] ? security_file_ioctl+0x93/0xc0 [ 423.386816][T23851] ksys_ioctl+0xab/0xd0 [ 423.390987][T23851] __x64_sys_ioctl+0x73/0xb0 [ 423.395780][T23851] do_syscall_64+0x103/0x610 [ 423.400375][T23851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.406351][T23851] RIP: 0033:0x458209 [ 423.410262][T23851] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 423.430310][T23851] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 423.438722][T23851] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 423.446694][T23851] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 423.455148][T23851] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 423.463226][T23851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 01:03:56 executing program 5 (fault-call:4 fault-nth:2): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe004}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:56 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffffff0000000000000000000000000000000000000000000000000000000000000000000000ff01000000110000000a00000088de6e72300000200000000000000000000003000000300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a33fad72c5d8f16741dd289f026c965cb82ce65dfb156f351cd285dc8197473245d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e00000000000000000000000000"]}, 0x29f) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 423.471575][T23851] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 01:03:56 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x419cbd2d3e01eb99, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x20) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 423.603517][T23878] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe005}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:56 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0xffffa888, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 423.691587][T23893] FAULT_INJECTION: forcing a failure. [ 423.691587][T23893] name failslab, interval 1, probability 0, space 0, times 0 [ 423.747996][T23893] CPU: 0 PID: 23893 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 423.756217][T23893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.766374][T23893] Call Trace: [ 423.769671][T23893] dump_stack+0x172/0x1f0 [ 423.774084][T23893] should_fail.cold+0xa/0x15 [ 423.778676][T23893] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 423.784596][T23893] ? ___might_sleep+0x163/0x280 [ 423.789499][T23893] __should_failslab+0x121/0x190 [ 423.794424][T23893] should_failslab+0x9/0x14 [ 423.798927][T23893] kmem_cache_alloc_node_trace+0x270/0x720 [ 423.804730][T23893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.811422][T23893] ? dev_addr_init+0x17f/0x200 [ 423.816180][T23893] __kmalloc_node+0x3d/0x70 [ 423.820817][T23893] kvmalloc_node+0x68/0x100 [ 423.825308][T23893] alloc_netdev_mqs+0x67f/0xd30 [ 423.830711][T23893] ? sl_free_netdev+0x70/0x70 [ 423.835375][T23893] slip_open+0x38e/0x1138 [ 423.839798][T23893] ? sl_uninit+0x20/0x20 [ 423.844032][T23893] ? lock_downgrade+0x880/0x880 [ 423.848873][T23893] ? sl_uninit+0x20/0x20 [ 423.853105][T23893] tty_ldisc_open.isra.0+0x8b/0xe0 [ 423.858301][T23893] tty_set_ldisc+0x2d7/0x690 [ 423.862980][T23893] tty_ioctl+0xe69/0x14d0 [ 423.867304][T23893] ? tty_register_device+0x40/0x40 [ 423.872401][T23893] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 423.878716][T23893] ? tomoyo_init_request_info+0x105/0x1d0 [ 423.884427][T23893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.890660][T23893] ? tomoyo_path_number_perm+0x263/0x520 [ 423.896280][T23893] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 423.902155][T23893] ? __lockdep_free_key_range+0x120/0x120 [ 423.907867][T23893] ? __fget+0x35a/0x550 [ 423.912020][T23893] ? tty_register_device+0x40/0x40 [ 423.917215][T23893] do_vfs_ioctl+0xd6e/0x1390 [ 423.921825][T23893] ? ioctl_preallocate+0x210/0x210 [ 423.927453][T23893] ? smack_file_ioctl+0x196/0x310 [ 423.932899][T23893] ? smack_inode_rename+0x2d0/0x2d0 [ 423.938090][T23893] ? fput_many+0x12c/0x1a0 [ 423.942867][T23893] ? tomoyo_file_ioctl+0x23/0x30 [ 423.947983][T23893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.954217][T23893] ? security_file_ioctl+0x93/0xc0 [ 423.959345][T23893] ksys_ioctl+0xab/0xd0 [ 423.963595][T23893] __x64_sys_ioctl+0x73/0xb0 [ 423.968351][T23893] do_syscall_64+0x103/0x610 [ 423.973126][T23893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.979286][T23893] RIP: 0033:0x458209 [ 423.983174][T23893] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.003244][T23893] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 424.011659][T23893] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 424.019617][T23893] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 424.028153][T23893] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 424.036138][T23893] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 424.044284][T23893] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 01:03:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:56 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000001c00)={'syz1', "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"}, 0x1004) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000001600)=ANY=[@ANYBLOB="fc6cdd5535f55331cd137de473917fb7132fe21f14ec8b68b19ed7e68a0a4a14e903f073b75e6ed01a338993e24d471dfa09fa69e1cf9c677b0fcfbe347a2fb2c5f18f24ab6762126e862bdf027e893e9ef9132910072d7757cacc36c6a794565a09ec80c0bd701c42c1558efe241fdc81b96954708c09286c722eadc66096c2e3176c3e497e4328bb72306c1cc4556cfc1c54ac9e1c965dd88380bb1c42765730dfb7fbade9a1990cca0960f1f280be8dd60971d9f8b19f2d2fcc6df7a3372d49866d62aaa1c9cc50b1fbcb4036954212f636a1d083d19900a62248e200e97a74"]) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001900)=ANY=[@ANYBLOB="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"]}, 0x335) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0xbbc1e7e536fb1be7, 0x0) r4 = socket(0x0, 0x2, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000300)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in6=@remote, 0x4e22, 0x8, 0x4e21, 0x4ff8, 0x2, 0xa0, 0x20, 0xff, 0x0, r5}, {0x38b3, 0x6, 0x6, 0x3, 0x9, 0x2, 0xffffffffffffff80}, {0x7, 0x9, 0x6, 0x3}, 0x2, 0x6e6bb2, 0x0, 0x1, 0x2}, {{@in6=@rand_addr="165f10267b72fd2b97dbd28d868c0115", 0x4d2, 0x7e}, 0x2, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3505, 0x2, 0x3, 0xfffffffffffffffa, 0x7, 0x80, 0xfffffffffffff031}}, 0xe8) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000440)={0x0, 0x1, [0xffff, 0x1, 0x4, 0xaea, 0x7, 0x101, 0x9, 0x80]}) [ 424.144083][T23909] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe006}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:57 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:57 executing program 5 (fault-call:4 fault-nth:3): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe007}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:57 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000008000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f73ec0b76655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f0040330000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e000000000000000000"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:57 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 424.411814][T23941] FAULT_INJECTION: forcing a failure. [ 424.411814][T23941] name failslab, interval 1, probability 0, space 0, times 0 [ 424.465300][T23941] CPU: 1 PID: 23941 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 424.473954][T23941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.484387][T23941] Call Trace: [ 424.487988][T23941] dump_stack+0x172/0x1f0 [ 424.492404][T23941] should_fail.cold+0xa/0x15 [ 424.497101][T23941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 424.503649][T23941] ? ___might_sleep+0x163/0x280 [ 424.508586][T23941] __should_failslab+0x121/0x190 [ 424.513684][T23941] should_failslab+0x9/0x14 [ 424.518273][T23941] kmem_cache_alloc_node_trace+0x270/0x720 [ 424.524155][T23941] ? kasan_unpoison_shadow+0x35/0x50 [ 424.529433][T23941] __kmalloc_node+0x3d/0x70 [ 424.534024][T23941] kvmalloc_node+0x68/0x100 [ 424.538534][T23941] alloc_netdev_mqs+0x821/0xd30 [ 424.543655][T23941] slip_open+0x38e/0x1138 [ 424.548029][T23941] ? sl_uninit+0x20/0x20 [ 424.552446][T23941] ? lock_downgrade+0x880/0x880 [ 424.557434][T23941] ? sl_uninit+0x20/0x20 [ 424.561927][T23941] tty_ldisc_open.isra.0+0x8b/0xe0 [ 424.567213][T23941] tty_set_ldisc+0x2d7/0x690 [ 424.571898][T23941] tty_ioctl+0xe69/0x14d0 [ 424.576222][T23941] ? tty_register_device+0x40/0x40 [ 424.581331][T23941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 424.588454][T23941] ? tomoyo_init_request_info+0x105/0x1d0 [ 424.594160][T23941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.601061][T23941] ? tomoyo_path_number_perm+0x263/0x520 [ 424.606941][T23941] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 424.612950][T23941] ? __lockdep_free_key_range+0x120/0x120 [ 424.619011][T23941] ? __fget+0x35a/0x550 [ 424.623330][T23941] ? tty_register_device+0x40/0x40 [ 424.628431][T23941] do_vfs_ioctl+0xd6e/0x1390 [ 424.633113][T23941] ? ioctl_preallocate+0x210/0x210 [ 424.638386][T23941] ? smack_file_ioctl+0x196/0x310 [ 424.643407][T23941] ? smack_inode_rename+0x2d0/0x2d0 [ 424.648681][T23941] ? fput_many+0x12c/0x1a0 [ 424.653267][T23941] ? tomoyo_file_ioctl+0x23/0x30 [ 424.658200][T23941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.664439][T23941] ? security_file_ioctl+0x93/0xc0 [ 424.669624][T23941] ksys_ioctl+0xab/0xd0 [ 424.673984][T23941] __x64_sys_ioctl+0x73/0xb0 [ 424.678605][T23941] do_syscall_64+0x103/0x610 [ 424.683270][T23941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.689150][T23941] RIP: 0033:0x458209 [ 424.693032][T23941] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:03:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe008}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 424.713742][T23941] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 424.722336][T23941] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 424.730298][T23941] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 424.738346][T23941] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 424.746794][T23941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 424.754844][T23941] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 01:03:57 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001900)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d50000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000099df00000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f61736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000800000000001e00000000000000000000000800000000000000070000000000000049444c4554494d455200000000000040000000000000000000000000000000e8bdce94745b2fdee89de53100280000000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c608c155d98870b291c8a5e656b4b31ce6e6c6d19bbe1f93f86bcb4dbc82e62ca6ef29947cd9b36c632c8b00bb9872a177265fbf60dcbb4585227564482de2b9442e712449f32c76d714c38a0d6545378706847fab5e69a3b2a81a1bef33d7c4ecbe02ae8f5ca5afba3041f20adea72a9fbf253243932ad340d7c2b35dccc35ec8964282546eccbd0057f3fff8261c35cde24a440a4acfa3012291187f9086df2731ac255e344df8a6f3a1c9ff50d6318273617ece27e88d8d8c438a72142a821202c72011af5b970b4aef0a28285ffa57f73b20e95784b948e5bf9a04f78599caf3b9d7011e0700000000000000000000000000"]}, 0x377) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x80002, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:57 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 424.885403][T23962] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:57 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe009}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:57 executing program 5 (fault-call:4 fault-nth:4): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:57 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe00a}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:57 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) [ 425.154796][T23987] FAULT_INJECTION: forcing a failure. [ 425.154796][T23987] name failslab, interval 1, probability 0, space 0, times 0 [ 425.192644][T23991] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe00b}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 425.234684][T23987] CPU: 0 PID: 23987 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 425.243081][T23987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.253837][T23987] Call Trace: [ 425.257253][T23987] dump_stack+0x172/0x1f0 [ 425.261882][T23987] should_fail.cold+0xa/0x15 [ 425.266685][T23987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 425.273151][T23987] ? ___might_sleep+0x163/0x280 [ 425.278114][T23987] __should_failslab+0x121/0x190 01:03:58 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x4) getpeername$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 425.284129][T23987] should_failslab+0x9/0x14 [ 425.288758][T23987] kmem_cache_alloc_trace+0x2d1/0x760 [ 425.294220][T23987] ? init_timer_key+0x122/0x370 [ 425.299186][T23987] slip_open+0x8ed/0x1138 [ 425.303628][T23987] ? sl_uninit+0x20/0x20 [ 425.307895][T23987] ? lock_downgrade+0x880/0x880 [ 425.312949][T23987] ? sl_uninit+0x20/0x20 [ 425.317656][T23987] tty_ldisc_open.isra.0+0x8b/0xe0 [ 425.322920][T23987] tty_set_ldisc+0x2d7/0x690 [ 425.327821][T23987] tty_ioctl+0xe69/0x14d0 [ 425.332276][T23987] ? tty_register_device+0x40/0x40 [ 425.337697][T23987] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 425.344312][T23987] ? tomoyo_init_request_info+0x105/0x1d0 [ 425.350175][T23987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.356675][T23987] ? tomoyo_path_number_perm+0x263/0x520 [ 425.362388][T23987] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 425.368466][T23987] ? __lockdep_free_key_range+0x120/0x120 [ 425.374540][T23987] ? __fget+0x35a/0x550 [ 425.378748][T23987] ? tty_register_device+0x40/0x40 [ 425.383848][T23987] do_vfs_ioctl+0xd6e/0x1390 [ 425.388537][T23987] ? ioctl_preallocate+0x210/0x210 [ 425.393821][T23987] ? smack_file_ioctl+0x196/0x310 [ 425.399064][T23987] ? smack_inode_rename+0x2d0/0x2d0 [ 425.404264][T23987] ? fput_many+0x12c/0x1a0 [ 425.410215][T23987] ? tomoyo_file_ioctl+0x23/0x30 [ 425.415333][T23987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.421906][T23987] ? security_file_ioctl+0x93/0xc0 [ 425.427097][T23987] ksys_ioctl+0xab/0xd0 [ 425.431242][T23987] __x64_sys_ioctl+0x73/0xb0 [ 425.436299][T23987] do_syscall_64+0x103/0x610 [ 425.440985][T23987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.447061][T23987] RIP: 0033:0x458209 [ 425.451053][T23987] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.471352][T23987] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:03:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 425.479754][T23987] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 425.487902][T23987] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 425.496033][T23987] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 425.503994][T23987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 425.513178][T23987] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 01:03:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe00c}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 425.596520][T24004] __nla_parse: 25 callbacks suppressed [ 425.596531][T24004] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:58 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001840)=ANY=[@ANYBLOB="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"]}, 0x2ae) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:58 executing program 5 (fault-call:4 fault-nth:5): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) [ 425.664225][T24026] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe00d}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:58 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), 0x4) 01:03:58 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe100}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 425.850303][T24039] FAULT_INJECTION: forcing a failure. [ 425.850303][T24039] name failslab, interval 1, probability 0, space 0, times 0 01:03:58 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 425.932849][T24039] CPU: 0 PID: 24039 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 425.941085][T24039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.951158][T24039] Call Trace: [ 425.954564][T24039] dump_stack+0x172/0x1f0 [ 425.959182][T24039] should_fail.cold+0xa/0x15 [ 425.964056][T24039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 425.970160][T24039] ? ___might_sleep+0x163/0x280 [ 425.975241][T24039] __should_failslab+0x121/0x190 01:03:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe101}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 425.980382][T24039] should_failslab+0x9/0x14 [ 425.984927][T24039] kmem_cache_alloc_trace+0x2d1/0x760 [ 425.990535][T24039] ? init_timer_key+0x122/0x370 [ 425.995501][T24039] slip_open+0x8ed/0x1138 [ 425.999857][T24039] ? sl_uninit+0x20/0x20 [ 426.004117][T24039] ? lock_downgrade+0x880/0x880 [ 426.009109][T24039] ? sl_uninit+0x20/0x20 [ 426.013366][T24039] tty_ldisc_open.isra.0+0x8b/0xe0 [ 426.018654][T24039] tty_set_ldisc+0x2d7/0x690 [ 426.023267][T24039] tty_ioctl+0xe69/0x14d0 [ 426.027613][T24039] ? tty_register_device+0x40/0x40 [ 426.033367][T24039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.040062][T24039] ? tomoyo_init_request_info+0x105/0x1d0 [ 426.046247][T24039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.052700][T24039] ? tomoyo_path_number_perm+0x263/0x520 [ 426.058363][T24039] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 426.064280][T24039] ? __lockdep_free_key_range+0x120/0x120 [ 426.070026][T24039] ? __fget+0x35a/0x550 [ 426.074301][T24039] ? tty_register_device+0x40/0x40 01:03:58 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), 0x4) [ 426.079603][T24039] do_vfs_ioctl+0xd6e/0x1390 [ 426.084654][T24039] ? ioctl_preallocate+0x210/0x210 [ 426.089869][T24039] ? smack_file_ioctl+0x196/0x310 [ 426.094908][T24039] ? smack_inode_rename+0x2d0/0x2d0 [ 426.100317][T24039] ? fput_many+0x12c/0x1a0 [ 426.104855][T24039] ? tomoyo_file_ioctl+0x23/0x30 [ 426.109808][T24039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.116590][T24039] ? security_file_ioctl+0x93/0xc0 [ 426.122108][T24039] ksys_ioctl+0xab/0xd0 [ 426.126739][T24039] __x64_sys_ioctl+0x73/0xb0 [ 426.126761][T24039] do_syscall_64+0x103/0x610 [ 426.136144][T24039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.136158][T24039] RIP: 0033:0x458209 [ 426.136174][T24039] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.136182][T24039] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 426.136194][T24039] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 01:03:58 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x7ff) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001880)=ANY=[@ANYBLOB="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"]}, 0x2d2) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, 0x0, 0x0) 01:03:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe102}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:58 executing program 5 (fault-call:4 fault-nth:6): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) [ 426.136202][T24039] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 426.136208][T24039] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 426.136217][T24039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 426.136225][T24039] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 [ 426.183080][T24049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 426.288701][T24061] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 426.385794][T24085] FAULT_INJECTION: forcing a failure. [ 426.385794][T24085] name failslab, interval 1, probability 0, space 0, times 0 [ 426.414504][T24085] CPU: 0 PID: 24085 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 426.422636][T24085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.432706][T24085] Call Trace: [ 426.436108][T24085] dump_stack+0x172/0x1f0 [ 426.440454][T24085] should_fail.cold+0xa/0x15 [ 426.445259][T24085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 426.451619][T24085] ? ___might_sleep+0x163/0x280 [ 426.456771][T24085] __should_failslab+0x121/0x190 [ 426.462054][T24085] should_failslab+0x9/0x14 [ 426.466722][T24085] kmem_cache_alloc_trace+0x2d1/0x760 [ 426.472099][T24085] ? init_timer_key+0x122/0x370 [ 426.477051][T24085] slip_open+0x933/0x1138 [ 426.481378][T24085] ? sl_uninit+0x20/0x20 [ 426.485784][T24085] ? lock_downgrade+0x880/0x880 [ 426.490626][T24085] ? sl_uninit+0x20/0x20 [ 426.494878][T24085] tty_ldisc_open.isra.0+0x8b/0xe0 [ 426.500069][T24085] tty_set_ldisc+0x2d7/0x690 [ 426.504646][T24085] tty_ioctl+0xe69/0x14d0 [ 426.508994][T24085] ? tty_register_device+0x40/0x40 [ 426.514371][T24085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.520688][T24085] ? tomoyo_init_request_info+0x105/0x1d0 [ 426.526418][T24085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.532648][T24085] ? tomoyo_path_number_perm+0x263/0x520 [ 426.538269][T24085] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 426.544247][T24085] ? __lockdep_free_key_range+0x120/0x120 [ 426.549963][T24085] ? __fget+0x35a/0x550 [ 426.554633][T24085] ? tty_register_device+0x40/0x40 [ 426.559866][T24085] do_vfs_ioctl+0xd6e/0x1390 [ 426.564548][T24085] ? ioctl_preallocate+0x210/0x210 [ 426.569643][T24085] ? smack_file_ioctl+0x196/0x310 [ 426.574738][T24085] ? smack_inode_rename+0x2d0/0x2d0 [ 426.579926][T24085] ? fput_many+0x12c/0x1a0 [ 426.584348][T24085] ? tomoyo_file_ioctl+0x23/0x30 [ 426.589280][T24085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.595600][T24085] ? security_file_ioctl+0x93/0xc0 [ 426.600715][T24085] ksys_ioctl+0xab/0xd0 [ 426.604860][T24085] __x64_sys_ioctl+0x73/0xb0 [ 426.609439][T24085] do_syscall_64+0x103/0x610 [ 426.614132][T24085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.620007][T24085] RIP: 0033:0x458209 [ 426.623912][T24085] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.643606][T24085] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 426.652011][T24085] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 426.659995][T24085] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 426.668164][T24085] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 426.676136][T24085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 426.684122][T24085] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 01:03:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 01:03:59 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, 0x0, 0x0) 01:03:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe103}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 426.710592][T24049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:59 executing program 3: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 01:03:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0xcb) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default}) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) r3 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x1ed, 0x800) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r4, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001880)=ANY=[@ANYBLOB="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"]}, 0x2f1) r5 = socket(0x0, 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000180)=""/229) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) 01:03:59 executing program 5 (fault-call:4 fault-nth:7): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 01:03:59 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, 0x0, 0x0) [ 426.789976][T24105] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:03:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe104}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 01:03:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(0x0, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) r2 = socket(0x0, 0x2, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x8000, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) [ 426.908188][T24123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$reiserfs(&(0x7f0000001480)='reiserfs\x00', &(0x7f00000014c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 426.960605][T24132] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:03:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f00000016c0)=""/4096, 0xe105}, {&(0x7f0000000a00)=""/119, 0x77}], 0x5, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}, {&(0x7f0000001100)=""/146, 0x7fffefa5}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/243, 0xf3}], 0x4, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) [ 427.012460][T24119] FAULT_INJECTION: forcing a failure. [ 427.012460][T24119] name failslab, interval 1, probability 0, space 0, times 0 [ 427.026120][T24134] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 427.079993][T24119] CPU: 0 PID: 24119 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 427.088023][T24119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.098159][T24119] Call Trace: [ 427.101536][T24119] dump_stack+0x172/0x1f0 [ 427.105859][T24119] should_fail.cold+0xa/0x15 [ 427.110438][T24119] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 427.116238][T24119] ? ___might_sleep+0x163/0x280 [ 427.121171][T24119] __should_failslab+0x121/0x190 [ 427.126195][T24119] should_failslab+0x9/0x14 [ 427.130780][T24119] kmem_cache_alloc_trace+0x2d1/0x760 [ 427.136336][T24119] ? slip_open+0x976/0x1138 [ 427.140979][T24119] ? rcu_read_lock_sched_held+0x110/0x130 [ 427.146872][T24119] ? kmem_cache_alloc_trace+0x354/0x760 [ 427.152420][T24119] slhc_init+0xa2/0x52a [ 427.156740][T24119] slip_open+0x99a/0x1138 [ 427.161149][T24119] ? sl_uninit+0x20/0x20 [ 427.165465][T24119] ? lock_downgrade+0x880/0x880 [ 427.170325][T24119] ? sl_uninit+0x20/0x20 [ 427.174646][T24119] tty_ldisc_open.isra.0+0x8b/0xe0 [ 427.179833][T24119] tty_set_ldisc+0x2d7/0x690 [ 427.184431][T24119] tty_ioctl+0xe69/0x14d0 [ 427.188749][T24119] ? tty_register_device+0x40/0x40 [ 427.193861][T24119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.200198][T24119] ? tomoyo_init_request_info+0x105/0x1d0 [ 427.206108][T24119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.212335][T24119] ? tomoyo_path_number_perm+0x263/0x520 [ 427.219431][T24119] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 427.233466][T24119] ? __lockdep_free_key_range+0x120/0x120 [ 427.239282][T24119] ? __fget+0x35a/0x550 [ 427.243517][T24119] ? tty_register_device+0x40/0x40 [ 427.248715][T24119] do_vfs_ioctl+0xd6e/0x1390 [ 427.253322][T24119] ? ioctl_preallocate+0x210/0x210 [ 427.258507][T24119] ? smack_file_ioctl+0x196/0x310 [ 427.263515][T24119] ? smack_inode_rename+0x2d0/0x2d0 [ 427.269215][T24119] ? fput_many+0x12c/0x1a0 [ 427.273622][T24119] ? tomoyo_file_ioctl+0x23/0x30 [ 427.278894][T24119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.285123][T24119] ? security_file_ioctl+0x93/0xc0 [ 427.290590][T24119] ksys_ioctl+0xab/0xd0 [ 427.294739][T24119] __x64_sys_ioctl+0x73/0xb0 [ 427.299406][T24119] do_syscall_64+0x103/0x610 [ 427.304257][T24119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.310333][T24119] RIP: 0033:0x458209 [ 427.314217][T24119] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.334480][T24119] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.343852][T24119] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 427.351811][T24119] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 427.359944][T24119] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 427.368002][T24119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 427.376138][T24119] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 [ 427.406246][T24152] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "" [ 427.428807][T24119] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 427.436792][T24119] #PF error: [normal kernel read fault] [ 427.442348][T24119] PGD 8874067 P4D 8874067 PUD 8876067 PMD 0 [ 427.448322][T24119] Oops: 0000 [#1] PREEMPT SMP KASAN [ 427.453594][T24119] CPU: 0 PID: 24119 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #34 [ 427.461727][T24119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.471966][T24119] RIP: 0010:slhc_free+0x31/0xb0 [ 427.476825][T24119] Code: 54 49 89 fc e8 70 b2 1c fd 4d 85 e4 74 77 e8 66 b2 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 41 b2 1c fd 4c 89 ef e8 d9 73 54 fd [ 427.496635][T24119] RSP: 0018:ffff8880904179e8 EFLAGS: 00010246 [ 427.502738][T24119] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc9001087c000 [ 427.510784][T24119] RDX: 1ffffffffffffffe RSI: ffffffff8453bd2a RDI: fffffffffffffff4 [ 427.518844][T24119] RBP: ffff8880904179f8 R08: ffff88805aa3a700 R09: ffff88805aa3aff0 [ 427.526885][T24119] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 427.534930][T24119] R13: ffff88804cd10b40 R14: 00000000ffffff97 R15: ffff88808b7f3700 [ 427.543157][T24119] FS: 00007fa153872700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 427.552333][T24119] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 427.558923][T24119] CR2: fffffffffffffff4 CR3: 000000008e5fd000 CR4: 00000000001406f0 [ 427.567071][T24119] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 427.575289][T24119] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 427.583420][T24119] Call Trace: [ 427.586878][T24119] slip_open+0xe16/0x1138 [ 427.591638][T24119] ? sl_uninit+0x20/0x20 [ 427.595955][T24119] ? lock_downgrade+0x880/0x880 [ 427.600892][T24119] ? sl_uninit+0x20/0x20 [ 427.605133][T24119] tty_ldisc_open.isra.0+0x8b/0xe0 [ 427.610581][T24119] tty_set_ldisc+0x2d7/0x690 [ 427.615178][T24119] tty_ioctl+0xe69/0x14d0 [ 427.619612][T24119] ? tty_register_device+0x40/0x40 [ 427.624902][T24119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.631327][T24119] ? tomoyo_init_request_info+0x105/0x1d0 [ 427.637209][T24119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.643543][T24119] ? tomoyo_path_number_perm+0x263/0x520 [ 427.649158][T24119] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 427.654959][T24119] ? __lockdep_free_key_range+0x120/0x120 [ 427.660852][T24119] ? __fget+0x35a/0x550 [ 427.665265][T24119] ? tty_register_device+0x40/0x40 [ 427.670653][T24119] do_vfs_ioctl+0xd6e/0x1390 [ 427.675331][T24119] ? ioctl_preallocate+0x210/0x210 [ 427.680429][T24119] ? smack_file_ioctl+0x196/0x310 [ 427.685502][T24119] ? smack_inode_rename+0x2d0/0x2d0 [ 427.690713][T24119] ? fput_many+0x12c/0x1a0 [ 427.695117][T24119] ? tomoyo_file_ioctl+0x23/0x30 [ 427.700216][T24119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.706471][T24119] ? security_file_ioctl+0x93/0xc0 [ 427.711773][T24119] ksys_ioctl+0xab/0xd0 [ 427.716003][T24119] __x64_sys_ioctl+0x73/0xb0 [ 427.720678][T24119] do_syscall_64+0x103/0x610 [ 427.725262][T24119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.731247][T24119] RIP: 0033:0x458209 [ 427.735131][T24119] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.755162][T24119] RSP: 002b:00007fa153871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.763556][T24119] RAX: ffffffffffffffda RBX: 00007fa153871c90 RCX: 0000000000458209 [ 427.771575][T24119] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 427.779705][T24119] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 427.787924][T24119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1538726d4 [ 427.795967][T24119] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 [ 427.804454][T24119] Modules linked in: [ 427.808342][T24119] CR2: fffffffffffffff4 [ 427.812674][T24119] ---[ end trace 1ccccd204ee0b135 ]--- [ 427.818121][T24119] RIP: 0010:slhc_free+0x31/0xb0 [ 427.822952][T24119] Code: 54 49 89 fc e8 70 b2 1c fd 4d 85 e4 74 77 e8 66 b2 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 41 b2 1c fd 4c 89 ef e8 d9 73 54 fd [ 427.842825][T24119] RSP: 0018:ffff8880904179e8 EFLAGS: 00010246 [ 427.849022][T24119] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc9001087c000 [ 427.857062][T24119] RDX: 1ffffffffffffffe RSI: ffffffff8453bd2a RDI: fffffffffffffff4 [ 427.865191][T24119] RBP: ffff8880904179f8 R08: ffff88805aa3a700 R09: ffff88805aa3aff0 [ 427.873261][T24119] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 427.881224][T24119] R13: ffff88804cd10b40 R14: 00000000ffffff97 R15: ffff88808b7f3700 [ 427.889196][T24119] FS: 00007fa153872700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 427.898543][T24119] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 427.905378][T24119] CR2: fffffffffffffff4 CR3: 000000008e5fd000 CR4: 00000000001406f0 [ 427.913523][T24119] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 427.921824][T24119] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 427.929777][T24119] Kernel panic - not syncing: Fatal exception [ 427.937622][T24119] Kernel Offset: disabled [ 427.943300][T24119] Rebooting in 86400 seconds..