0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x40000000, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:31 executing program 0: semget$private(0x0, 0x207, 0x614) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x4000) connect$rose(r0, &(0x7f0000000080)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @bcast}, 0x1c) 07:55:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xf\\\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x100000000000000, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xf3fc39c1805e847e, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1400, 0x4) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) 07:55:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x400000000000000, 0x0, 0x0) 07:55:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x200000000000000, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:31 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfc\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000180)={0x0, 0xe2, &(0x7f0000000080)={&(0x7f0000005800)={0x58, r5, 0x121, 0x0, 0x0, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x3d6}}}]}}]}, 0x58}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x4c}}, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r16}]]}}}]}, 0x4c}}, 0x0) r17 = socket$alg(0x26, 0x5, 0x0) bind$alg(r17, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r17, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r18 = accept$alg(r17, 0x0, 0x0) r19 = dup(r18) write$UHID_DESTROY(r19, &(0x7f0000000080), 0xfff2) recvmmsg(r19, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) accept$packet(r19, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001700)=0x14) r21 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r21, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r21, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(r21, 0x8933, &(0x7f0000001740)={'veth1_to_hsr\x00', 0x0}) r23 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r23, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r23, 0x6, 0x1, 0x0, &(0x7f0000000040)) recvmmsg(r23, &(0x7f000000a1c0)=[{{&(0x7f0000001f40)=@nfc_llcp, 0x80, &(0x7f0000003400)=[{&(0x7f0000001fc0)=""/204, 0xcc}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f00000030c0)=""/216, 0xd8}, {&(0x7f00000031c0)=""/84, 0x54}, {&(0x7f0000003240)=""/133, 0x85}, {&(0x7f0000003300)=""/180, 0xb4}, {&(0x7f00000033c0)=""/19, 0x13}], 0x7, &(0x7f0000003480)=""/47, 0x2f}, 0x7}, {{&(0x7f00000034c0)=@ipx, 0x80, &(0x7f0000003640)=[{&(0x7f0000003540)=""/203, 0xcb}], 0x1, &(0x7f0000003680)=""/204, 0xcc}, 0x3}, {{&(0x7f0000003780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000039c0)=[{&(0x7f0000003800)=""/55, 0x37}, {&(0x7f0000003840)=""/127, 0x7f}, {&(0x7f00000038c0)=""/202, 0xca}], 0x3, &(0x7f0000003a00)=""/108, 0x6c}, 0x3}, {{&(0x7f0000003a80)=@ax25={{0x3, @netrom}, [@null, @null, @null, @default, @rose, @bcast, @rose, @bcast]}, 0x80, &(0x7f0000004040)=[{&(0x7f0000003b00)=""/88, 0x58}, {&(0x7f0000003b80)=""/190, 0xbe}, {&(0x7f0000003c40)=""/247, 0xf7}, {&(0x7f0000003d40)=""/105, 0x69}, {&(0x7f0000003dc0)=""/179, 0xb3}, {&(0x7f0000003e80)=""/55, 0x37}, {&(0x7f0000003ec0)=""/245, 0xf5}, {&(0x7f0000003fc0)=""/92, 0x5c}], 0x8, &(0x7f00000040c0)=""/4096, 0x1000}, 0x2}, {{&(0x7f00000050c0)=@xdp, 0x80, &(0x7f0000005540)=[{&(0x7f0000005140)=""/215, 0xd7}, {&(0x7f0000005240)=""/65, 0x41}, {&(0x7f00000052c0)=""/244, 0xf4}, {&(0x7f00000053c0)=""/231, 0xe7}, {&(0x7f00000054c0)=""/121, 0x79}], 0x5}, 0xc725}, {{&(0x7f00000055c0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000069c0)=[{&(0x7f0000005640)=""/55, 0x37}, {&(0x7f0000005680)=""/231, 0xe7}, {&(0x7f0000005780)=""/145, 0x91}, {&(0x7f0000005840)=""/99, 0x63}, {&(0x7f00000058c0)=""/93, 0x5d}, {&(0x7f0000005940)=""/4096, 0x1000}, {&(0x7f0000006940)=""/125, 0x7d}], 0x7, &(0x7f0000006a40)=""/237, 0xed}, 0xffffff81}, {{&(0x7f0000006b40)=@ax25={{}, [@bcast, @null, @null, @default, @netrom, @default, @bcast, @null]}, 0x80, &(0x7f0000006e40)=[{&(0x7f0000006bc0)=""/138, 0x8a}, {&(0x7f0000006c80)=""/183, 0xb7}, {&(0x7f0000006d40)=""/229, 0xe5}], 0x3, &(0x7f0000006e80)=""/14, 0xe}, 0x7}, {{&(0x7f0000006ec0)=@xdp, 0x80, &(0x7f000000a080)=[{&(0x7f0000006f40)=""/4096, 0x1000}, {&(0x7f0000007f40)=""/210, 0xd2}, {&(0x7f0000008040)=""/4096, 0x1000}, {&(0x7f0000009040)=""/4096, 0x1000}, {&(0x7f000000a040)=""/32, 0x20}], 0x5, &(0x7f000000a100)=""/192, 0xc0}, 0x7}], 0x8, 0x12100, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r27}]]}}}]}, 0x4c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f000000a800)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1200080}, 0xc, &(0x7f000000a7c0)={&(0x7f000000a3c0)={0x3e8, r5, 0x10, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r8}, {0xf4, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x82c}}}]}}, {{0x8, 0x1, r13}, {0xf0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r16}, {0x1d8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81d9}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x3e8}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 07:55:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x3f00000000000000, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 913.811136][T17418] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 913.836062][T17418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 913.891994][T17418] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:32 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfd\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x500000000000000, 0x0, 0x0) 07:55:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x4000000000000000, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x2, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(0x0, 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 914.594958][T17434] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 914.606383][T17434] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:55:32 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)="fe", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000a0, 0x0) semget$private(0x0, 0x207, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x1000000, &(0x7f0000000540)={'trans=unix,', {[{@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@cache_loose='cache=loose'}, {@fscache='fscache'}, {@cache_none='cache=none'}], [{@smackfsdef={'smackfsdef', 0x3d, 'skcipher\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'lrw(aes)\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}}) r4 = accept$alg(r1, 0x0, 0x0) r5 = dup(r4) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dlm_plock\x00', 0x8cb067ea6e6a5c90, 0x0) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f00000001c0)=@usbdevfs_driver={0x0, 0x8, &(0x7f0000000180)="55426dea25c896cf9f1069ae6c8c6ffb14d661e6a156d79a3b1b656c5e62e43489a52f59"}) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0xe) 07:55:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(0x0, 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:32 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfi\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x600000000000000, 0x0, 0x0) 07:55:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x3, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 914.642834][T17418] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(0x0, 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xb, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:33 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfl\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r6}]]}}}]}, 0x4c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r6}) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r9}]]}}}]}, 0x4c}}, 0x0) sendmmsg$inet6(r2, &(0x7f0000002180)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x1, @mcast2, 0x78a}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000040)="55a9adf17c3612eadb1aa0764e6dfa113ab405f33316151de6753a71e2aa15b7a88d59c51ec253d8b369e8014108d1cae454da7d8f20529e7d1b74beb5ac71746d2542b426813c6495e3473ffe10c0f33201c58d7f34645df5de1332b1ec9f83f147e6e11b028bdcc18eac1d0b7905b11c78185e5fc2b02773bb43c64cbe55905a2d9b08af230a888a746f82a86d2a075b1e2f89d076d6063042cda006c8c3e7a391341179a5fcc62e5bd33dd1051f82cc31f7d010fc11ed", 0xb8}, {&(0x7f0000000100)="b988e5b80d6e39422e058fa2ba0a8efe52226dfe1196a7f73ab48320511d59a250febf7318547dfa401f7fb927f393fc01b70161c2ad6f5d42cdf345b2ec2d5c928f1c0a629fd996446c2de7fd662fc51e002337d26ce6fd06e3597260bc7cee352570c8c42bfba8a9ef51695051d0421f6997a2d81274500aaf13461a271dc81c026b522ef0162696561bd702e91225e2122e12f04c8e1b09d1a169acffd08b7f5af09e122d6d6c14bde52d28f2e1a54db743f389c8f53cc49604e4c8396d18fa55e2d59afb01e01b2d9c8325bbb68d31330f86104faa643ca05d2662c101bbfc1680b34fe968eb1beb88b04a289a", 0xef}, {&(0x7f0000000200)="b4809eb7870c86526f9b410d901d6fe59520c8892d6d1715a94be245773bf078f29595c1427314ca66b8b57075843d25c5b3", 0x32}], 0x3}}, {{&(0x7f0000000280)={0xa, 0x4e20, 0x3b0a, @local, 0x5}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000002c0)="38557efe68f81d7a605703c1bbac4eba49cc60322f98106fa431cb7c6a877f96c8acdab56296c203150c2ff9ee86b6d0a1733ec637346fbe76aaca7e25c57b83e3dc5435a697c3635f98162e25083b9c230f4b072d67cc7265eee41b0edac2aee336b3e7679afa7f983fe48b44c69f47daec5402d8c732619f2ad302149d2d5387f7cdfb9c1622ba5b87e9dd9831226f5a0227ac", 0x94}, {&(0x7f0000000380)="7f6f3b803b00412f7542dda583f336925e8abddcc2bc450840b90cd673e651aef56b4f4fe6a6283ccce87cd13871e59e682888de4b5ccfb9ad28e9eb463d41a28ccdd9c6d0be9d883e87aecd82f0c35d4b2238d5ee4229dff82cab50cd0f0ee8df45724de2a482516e25b9949c08a2c1e5cd33c6c863c92d1f653e7400ca99f0ed8a5c68f078859c07422f846da168da3f7534d38687f886d1b936abec4c098dfdb8992d8017482807ce61e7561ab42eafddf564f172b9c27c3ae53e17e316f4053053dec91a5264cd2c401aaea607fd10df93d6e2", 0xd5}, {&(0x7f0000000480)="e0ae066e85534e970062f2b14447c1b5d56c4ab4182ed470db51f0932354e4e04cbd1e9aa50d11662c6a6fcd0404b5fa3f71c555559dd0156cd58b1282251367118871f096d082519b302b2789c18cd1889aaaabe9a053bdc3b3507d77d887ce8a832c705b01662262fe2c6da785cae8b3020bbe85413e22bdba6a5dec8b752bba719634ddd29b2799ec805f37af43e5dc0eac5ea0b677fa03cace22980b3eb9", 0xa0}, {&(0x7f0000000540)="39325490af47373dce07d5f3e69d04fa5e3d8af807070233a74b35f0c08c8034c4192fe4dbef0adbec89f6fd7cc4f77ee99ba5a27e8873930d6d03e56718d884c6f9e3ed09bc7adf2ad14b544dfad1b9e3a60f0090545d33149a75680cae998c734946b676a142ab10406a01d4698d89bcd01c1652ad0d91eba0cafe925748aa11ec4c9d92e6861b6fb9e8cf68c4291254413cd174c6c5819df20c3f521e4fbdcc83bc69427a5bb9a7215ce8c14a483b585830ca01e9db14b66c5061d4ab74efac84b0d3b55ded8653911505db558250270c7124217deae80906", 0xda}], 0x4, &(0x7f0000000680)=[@rthdrdstopts={{0x40, 0x29, 0x37, {0x1d, 0x4, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}, @ra={0x5, 0x2, 0xa3c3}, @pad1]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x32, 0x4, 0x3, 0xd7, 0x0, [@local, @local]}}}], 0x78}}, {{&(0x7f0000000700)={0xa, 0x4e22, 0xffffffff, @remote, 0xfffffa1c}, 0x1c, &(0x7f0000001b40)=[{&(0x7f0000000740)="2e473a4db7b5dc8d2ffd27dfca2fb3d6f5a86f484bf8aa8d81c3fbc175b1f055548dd26c21ce9ca5d3d6ef40a88e9b7874b33846baad40ffed1bb0c5248c1f12704edd1dfa14b120f6ecd615319738f0d38e9f397509daa9140a463a1102e8f20561b830012ba17b4d6fdcea0de272aa4ba2a96829385731d6a419a44bb745710d7e5e696b728aba7a220d319c2a5ffdc97051b7c1aca7c7ca63db8c59fe2d053640f62907da5821ae064e81a9a775f65298741df6351dd8518cecb7ec0e", 0xbe}, {&(0x7f0000000800)="ab080c7f54488983931e0bbccb7195cc72df88adeaaa65ff2add7e5204a84f401f4993cdc098af2820b6cf918d508fd28ececfce15113a55f7053dbd0ef6c042a31a457582daa1ea3e3f3eb590dc1478a0de6f2a8a5004261b7d86177a7398b30454cee90270a5904c921d5980efa937f6670b9e755f4bec0b14be487e82811578ae978444a54707f04f5810597ddf9ef083a23729f88c1000c8c39e2894b5b5cb0c88d51aab5832889d53a815e8500bdde57e29e519aa38c74f06bc5936c0a51d5c8d0f3839e78533d82d3ec0205120a60bd1b2b129015cbccd1d72062b346656f90d88ddc3", 0xe6}, {&(0x7f0000000900)="f5c72d23fcbf5d7feb07155478ea073521be3b9276ddbb7caac95e3206929e160d8aaaf94d0ef23568d48f3bbe8b04df4dc52d19b332df15ae38e0ddb5ac4eda3e93eaa2657cfab50ef6177e934d0d16a70961a7932be454dff6dc403933b83fdf0e4397b53002f9cdd2bde9999733e379e49ce34bc78310b8f8983eee4ab57de4c0a29432f7379be97412db68dd0be26647e61bc8fa4c96697bb6b7685724bc219ce9200d23909c68ef3203702a1ce8ba53bff918ac27d83e3b5814b6288a37df92f251ff8a5d2513588180a82c1c2d491204986b3ddddd4a074dc58aec802708f89557d2aa74de64163a4f38270336f9fcba5dd291a0fec405e664d220ed32d2ffb5aaf7fec205906f166286d703bb1207ca1516012115b0ed33b6d0c55ae3202fa0ae3dc28064e4d301b563dd36b7bb5841ef6a5a8d519fd4471af639ad1210e9ef8c167ca230cc6fe487a580102a67979117a89cbdf0df16d16f9f42535b9751b1d79de6c45971d52cfa188abfa5f7cc1d006b9cdb0b054c2706731d2b51ef35b00d78183a629965e342a3ee7592fc36c44ae37317812eb635ab8b91fec1b2f8d437aa9a891a653890c8f1be4f29fadfabe0e050c7abe1dd710da45b695b276fe49b0e904c054868c5a918dd4408bef60c66eab28fb2f3fd5bf1253879af4ba393f442a23344e9e97dac1177f894e5517717d9e7232275e85ae0963f18528e0955373d718224a1fc2fdff1e220b5f571274a60acc9cf8e6589c2bbb95fa00ebb1cb36522df0794d9d24c60088daaeadc89d66ee3e0ddf2f40c3a9de9110ee5f91962418b0198235285711b52f67b3082ef1bc07cd39b3e544ca7801a5805f294bb8ed7051ca8f8f56a495aa7787519d3e328b458626e22cf08338cb7a1cd2fa1c56a0e5dd244df9588e59277fc78171c4e6340582de89a794399eff2c9b326e6d82ac7de2925784635c9f898a7a5cb139f67628fef68114278c9fba9fd2f383e766110e349957d9fc60ba5d73ee240c3532f6391a104fee0a7b4f4ce5b28c8608b3f5e224d782705d9c4cf301bdff632be5bef8e389dbfa0a0e50435341931cf71843b6a848b11a8ebcb0bb328d2a54e036ee3644ac05ff910e5077b1a0048e8c326d5bdd1dd270fe632eed7e7a8b3135388f04300290ee29f5d39e13095a27f345b81e3c145f32c434462a01f0a0a9f57ecf4e189c69e09b658910985c87ae62de6198282630a55b7d37e84d66b0cbcaad28ff91bcc952bab3b0fb58a98a5b98121ea35bd474223856c10c26f5c26719130c59caf711827af7e1f408a0d6107a865dfe288f9577f01e919ff1d314bb8fe81c684cf083b4ab6d40c4cf43ff67ceb3d4e26e8603e3d3c9154bb4ff5fb553ee1fdecee4fe1a4a53928d0292d18f0d1cc489df43a6ae2224aa36961575f8cab6fb375a47c2f5db16555cef1ced8ca6969f678a99ed5506991a3545f2ef9dcaf52d50315656983b59026740e4f4289ea11fe306a922925a329c34b83d8f6544eadd96470c4db83010b6a6886334c4708962a2487ea128b8eb0d5327616e719970d43a505362d4e0dda847af2ae1460d7945d76062bc2cde8a73bb2be7b3aa1308d93e35110c99417728cdd25e526297010f46f00afa568780c449c5f75752e90f005cb12af3b4e5e235621d154563fd4d2bbc735d2c49e99cad115bbba8f502268e1b27ec74ea326820472040fc60746d686e32cc7fda693107c84c10e12daa49f96b1950b304770c949f6887e97c0c04d3fd030cee46a8a38b1254840496753112475858eb4ae7c123d6c1d873e38b7724ddc9a1cc36426a9fefd73bce27732ccf9e5e1bbe04e1a653ba183976d6f3dc0351f989204308f5a6865564e1396b94da2a0356872d0d997f71e744c398294adcf26dc98cab447d03b85487c650ba3f82563c1478ab37193e6094ba8e5589ed377c73117df1919188dac4c98fd17cebbf9a7376525d3b3f02355b20763fdc8054b65c1791fafc606497486d9f979b16053f5980e9144c6b2ee743202f5a98912d3c61006dc7f93c1c4752cdcf4ad2cc8b4458dd3dc7af62ad356de35a0bd373beb6316891c0577a506dadd11cc70d9d6cfa1afc2f2a9e1a2c5071d67c793fc8fd554f9d72eb6b3818cb853aeef28f186e9ee4249f694e9a9783b32a947f1cc33f4ad6fdc0eb59795115a9d69403cb97ef61ce4d566793933f6f23c6a39cdb581f3e24620f81ddf6e208a977eecab513bac246e7a36aa69b82a91926e3fe46202ea96daa04b951b7c015876d4d8e4f1472274a30bf57b1a9c9e2d542047cf749971ce029798f34415e74538458595ab74d68c2c9a9b94aa408c9cfc8f22e729cdec633a608bc8fc763ba72ea95bb2aba16abc2a9cfc20bb316ed0a7d3200110dc85dbdfab9920f59be4658a191c8db7ccb7d8fd3e54ea59173bb624403ccc428a3eba7050a0c42231dd92d118d7d14bcb1f3d74e01d347703832bbf033a3c81ce46cf51542b6ab6253f257c92955884015ae80435258dd909a35d0daaeec3fbac4d1ec106e78f5ebbbe34f6c2fa695aaee67274bd8035379c08166a63708713406123e3e17bfa8ab5b7b7004f45dd6c4b3288ed766769e62865a9092e3fadf9910cddf353e4c0e21bdd72d1dcd693f587776f258f4ec7a758e91ee0b40d90573f23bc9066701c25189912ea36987a9b6e7f5289e3e5b25880b76adca5b5c356e0936e1f30ca2aee12a6e3eb0f25dc34cc6d21ccac316560f395b0f3672bf05f7bc84654f55144f1f7b7b64d0ddec4fa353f4723695e0bb4dba5300d7071ba602f93e9f0dc586e02e7c4884f21580b873b327620962354b446878f9a3515a0d79631e0b69390e43ac1780a04b87dec9dd5c3dedee399f11ca4997127713c1f6b57c86beee0b4b84e9d7fcf3902571b8cb0f2dbf29d80deba32119c6a978032a54612fdfb91c3f7da3d76e52737d44a5de2e110e6d68a5c9d50bcd51fc8e3416d429f2b601c2c1beb73e1b957f9573033e2804e26e9e7ce6a5b57101c19cea2c6e934e74c3444e65db8b3868821f1c60e4e5c0792f7e0a9501b0bd67d23034dfc8f50c5738200c521790b4ee9c95106fe020501e856db34e219a338522af487de1e6348c218414de2614c0b85cc4c1d3781ef6c524a716be090240bd795dc535d6b0442debb5da3209b20dd7593061c2f37bcc0838b7102af8f83c017710981d8739f6cd7ac5e1fcbf0eeb639f6e7c14241535b7cb3b44b16a8911fdd25ba8dc822b1a28a78048f8d0009248a43fef4ec2330c5a942cb0dd08a54a40f76ce99a5cb6b632b9362a31097c5e3b44169cbfdc48386dd19c53bfb5d6936e962745619a3b2326511414082dc753867b4216743c72aa36085a905258ed0ef6346bd53dd800141540d784689288f4ed216822850ac5ca9a5cd697c8265ce1deaf9a804066f7140e90ef26b5f08d30b26c20170992e173d3bdaece7ee8622147c28764a980adff855cd16be4fc08b751428bde90e568e89d810e0e8a5cb802cc0925ca35c5a3e80d3c26796837aa30e416f1078c1ddbe8e25c46db624d706fc832a565cfdc2a5dbf14db55f1455736ed03c4e3d4d46956c190811bf1260a1e11e64e6473c0a87a751cdf7a642cd5fdf2cbbe9b4c3086ad40ce983b86a32311795fcfe5f23800c20a202b1cdf49512a3c6678155d5d7418cf94ee717e997275f19cae240622fa5391a6dfe00fc74676eef664e112bdc829016ff035ee51c4e9daaa3d38cbf0b331884143ef8a3a45d0af1ba614903cf5bf3dfd5eb32799ac5f9e55248286e62a9573b68c544baf84bf555be4305e7e87f5816746b8fbb1bddf2d409046eb23959785968f6d75acf3f7a0ed358a92d185905e13c9b8119a7d0a78ee2cb84d3433ddbbd1cf73da15952084db1586bf1b962d077b36cb7b28e51203244bd0c0712a23110258a8f2f2f26efc6d431555e03c48e32cc829879b88dc598c4c42c5cb18f57845a55f4215f6c26ae6a811dc82b77daf2c239d83767d83674090e4720c74a4890698ca3538a0fa6ab9b192d96e0408fac1304605d78562915cfe85ac975441838586eb208d74e6056008b2481b58b21edcfb914a98e934493a9f41734dc7f0d081a8e905fef40d8e0a997bfafefd0dd5b50220f83f8496c81bf5407146e3387874178fbca3e7e793b4e1e46edf2e9877101a3c1a1242f3458c9145ca9991be56a58b4ed6c315444a7f5714836ddddbafe036e1b652bbfa3c0cb2635292e59ad135a8224a9a8f5a3be110b1b3030ece2a8279979a370773c01f6b65fda63f94bde6a1ecbbf869a78e333b4563a1f4fde0cfd0d78155244a2173c1fc9603efb195b488ad258042da2ee56aed382ea3a67686543fbbfa18b2cb90b0ede7807ab4a9d5959bc53da761aa68481d024de556f0dfe1fb17b5a8792d101f716f03cbc31dd627319b5d0e62666630c36a15ee15d214a178113a9b96cc53c48c72f095ddcefe475fce2086dc0007c5eb71f9eb18bf68cd2f8c29007d6d5de09bb40bb1073df0c1d17a4959c0fd402152ade56fa2dd56e586293f19e97441d8e8075922b03f56f01a03509921e9ba6da40392c2a31e46db69a09bacfffe87b82305369f662cf3cfc11c0c235b05e22142a0585223883fe8cfcbf6ea1daf6063a7a7eda87284b6d6b5472ef66ccfb45fb9d485abb10bf49f9dae79c796f82e8a267909497a94602d4674855cc527670e54ce2b944dd56f6caa47929acbb85b9da8216c0c5f7845fa2e55512aad9de1277ff97dad723fe09110b4ba5fba85f639189e2c60f6695978d4fe1a1494d670357561ab4caeefe5ffaecd143967feb2b9069e730b666b8773e39e07fd068d6475911f3a6e34f9e28bcac63bb3fe2c90ec37e7f6ae741f5832f2683d236b271ee0b9f9b804bbc86e46c7b8ffabfb1debc5ddf9f236e338544216039e152f498d042103600b418d2ae84aa2ec84e25c88fbd0f1cb939334c73fe15894a93afa8803b3120244651b2f24c7f09092fb770b2292999390ca97afbfa563a3ee8dd29144d276c6762f829ee2e0d78a123be9510a2a537634026687436650c3be12064f330d8446d4f95adb41e3a9307f88d1d9da60f7b3b675737d91a734c6ecc6bcd90d50bb203a36e1f1dd84655cc4faccf947151639125b68d1dd5d192e61ddedc14bacba831a51c63a210a3a12544618a86cdb79515ce2537893153f0ffe585d699fe135421971ecbfb73feda6cac8974e526d1189ff180a9f7e51087d9d5e5674bdfe75cd5daf53f1534ab800b6508b36905fbdb57b2281ef9fd224c76212515ebf3fe3e8180907d9dc5340af34e1731e197711993dca3fd48aa66b29c894fa12647ddadce4530bf1e6bc1a59020688eb13c7bed3097255ed009f015a51803b985dc087f9466e218d25e8e48d9d52dfab895c3b9986b57682a8e64160ac0bf647050dcd2619524931e0e4020db3bca9be62483413acf1ed2aac6defdc9b756b032c8ac959e74ea56c4d5d9e2ee49c272070a54e6392beedb8a714a35bb994bf2cb32baac1fa2e5ff87f8bc6d0b559fc67e7b4a6040dbeb1e380a58f86e78bbd270d3af71d9f3241b012dab7c9dbb6a3fb01b14d41a191c7d6ee1c81085468a9bebe4beacefc3ef8aba0331b582813448f8d4c1ae6c3b6f8ccd65164dca59cd0b0ac01fb0a545b18818e5cf65e3f50c51a654db2ff4e73907bbd6a5b3da5b255e8af28b18fde27bccbaf50e21f17f525d65a4c748950f3ab3ef45ef93dc4291569951d7fb38ec1e0acb4b99ebd457f7c017", 0x1000}, {&(0x7f0000001900)="eec7eb26393398709ace6efd3cc8cbc36db03e06ecd4bd2c652f884e22806d950b94e1979233978ab38be44b", 0x2c}, {&(0x7f0000001940)="a8888c81101e2ad0e82c802709d95b61e5a148eee6501b1017cbcb73d7bf2e77bc483255dd0a97eaec59792e5b9571691eec450a5936ed04f84f2bba93f756c0b7afd689", 0x44}, {&(0x7f00000019c0)="9d5ff1fc9659787f4eead9302afe36757919480888fb15bccd187788383955b436956032151f0d3d484fd1a6510c5f8b9617d2615e4802c47df353889f129d70063b922be353d8c255357fcb7d3ab96cd6ce4b69cca54fb9a8fdc712b3347abab1116064d00a855c0a2b097e8b73b2ca7de7", 0x72}, {&(0x7f0000001a40)="9d3d4d019c228a4f50e89ac6fbf9e4f6fb5b952d2fae600b1707ed980f0cfa6de2b316a3fdac7e4589ec6e3d8bbeb2004f95aee25ea011ae86b1528759b6b4d1ae96002e3bdb3b53000353d928aa1c1995875205743faeeb511a0f3f75012f3aade6e2dbf54b8460c144de63eaedf8c52b6c82e80f279f9b7f6b6eadf4ac18de9fac7143cbb311d92967770de0331ac7a1b77a98fb87cda833661b70671648acc8212514ed5fc386eed3105768630b7a8f0669a207446564c3aba0eaf12eab25e151c7e967f1b6a6d9041cf9a16d7128dcc44d24bece3fa7d81cf56875b44dfd532787332e28", 0xe6}], 0x7, &(0x7f0000001bc0)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x66, 0x0, [], [@ra={0x5, 0x2, 0x6}]}}}, @rthdr={{0x88, 0x29, 0x39, {0x2f, 0xe, 0x3, 0x2, 0x0, [@ipv4={[], [], @rand_addr=0x8001}, @empty, @loopback, @ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @local}, @loopback]}}}, @dstopts={{0x20, 0x29, 0x37, {0x3c, 0x0, [], [@jumbo={0xc2, 0x4, 0xc4e}]}}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r6}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffff7}}], 0x120}}, {{&(0x7f0000001d00)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}, 0x1c, &(0x7f0000001e00)=[{&(0x7f0000001d40)="ead9d1e9cfb30888cc7c7c6682b49941b9583cb0ed43916d7de2788488298e9facf4ef640e7310435d6cbd32a5c14d2334cde34d31417c5bf7ffa0cf29af04d2cc89b7d0b8a2703d5504b2fef77023895b491e4d05b06770bcb5d874cebed849c8b0559d8a991336f66e003ce6b433fea0e8c9d53346e4f35b0836075a734fe775eb51bbe9cd84c548c0ee1c72d33020c5ed47d36c5432ec9e", 0x99}], 0x1, &(0x7f0000001e40)=[@flowinfo={{0x14, 0x29, 0xb, 0x100}}, @dstopts_2292={{0x88, 0x29, 0x4, {0xff, 0xd, [], [@ra={0x5, 0x2, 0x4}, @pad1, @ra={0x5, 0x2, 0x7aa}, @jumbo={0xc2, 0x4, 0xff}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x48, {0x8, 0x10, 0x0, 0x80, [0x5, 0x1, 0x2, 0x6, 0x80, 0x7ff, 0x8, 0x3]}}, @ra, @padn={0x1, 0x1, [0x0]}]}}}], 0xa0}}, {{&(0x7f0000001f00)={0xa, 0x4e21, 0x0, @local, 0x3f}, 0x1c, &(0x7f0000001f80)=[{&(0x7f0000001f40)="e4e3b8313dbcf223caade885721c6fce20da73f3b3234e5a69b33a923cb5fdc99001f4db0eeb01cdbb88aafa563aa56b0553565085eea16442", 0x39}], 0x1, &(0x7f0000001fc0)=[@hopopts_2292={{0xe0, 0x29, 0x36, {0x0, 0x19, [], [@generic={0x8, 0xc3, "d83c802b3c27264e75f06b821fa80da93bd3a2148859606e6d311520b59b3aed484cf2673306a7d1ad0a5d5f83224793ec29b1ed6b3345fe5778cd3b29ac44cb407f88918821b13a53cad07c0f6c1a42756ff66a90662c1d9acb8dbba3e9003f5ac6bb8b8f7d2e0c3f523c27a2a1be4421246fe042f0965b6776c3c21b8e6f1516211793167f5c2338c8f5d9e66eced3fb6e7ebd17036979413dd25efb2562518752d5ac964b0977067ec430883259e69b4c01d7a087567a88edbb66f7eae10a172455"}, @padn={0x1, 0x1, [0x0]}]}}}, @dstopts={{0x78, 0x29, 0x37, {0x0, 0xb, [], [@jumbo={0xc2, 0x4, 0x4}, @calipso={0x7, 0x20, {0x10001, 0x6, 0x8, 0x401, [0x53, 0x6, 0xffffffff]}}, @generic={0x1, 0x16, "d63b4f1c5f9de23fd718f6e351255b2eb9d892f1eee7"}, @pad1, @ra={0x5, 0x2, 0xca}, @hao={0xc9, 0x10, @remote}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xf502}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r9}}}], 0x198}}], 0x5, 0x20000000) semget$private(0x0, 0x2, 0xd7) 07:55:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xc, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 915.081401][T17509] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x700000000000000, 0x0, 0x0) [ 915.181366][T17519] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xe, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 915.264959][T17519] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xf, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:33 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfo\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x10, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 915.479220][T17533] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x800000000000000, 0x0, 0x0) 07:55:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:33 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfp\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x1200}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480), 0x106, 0x3}}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$UHID_DESTROY(r12, &(0x7f00000003c0), 0x4) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r14 = accept$alg(r13, 0x0, 0x0) r15 = dup(r14) write$UHID_DESTROY(r15, &(0x7f0000000080), 0xfff2) recvmmsg(r15, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r16 = accept$alg(r15, 0x0, 0x0) r17 = dup(r16) recvmmsg(r17, &(0x7f0000009d80), 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r17, 0x5, 0x0, 0x0) r18 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r18, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r18, 0x6, 0x1, 0x0, &(0x7f0000000040)) recvmsg(r18, &(0x7f0000000440)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000640)=""/119, 0x73}, {&(0x7f00000000c0)=""/17, 0xfffffffffffffffd}, {&(0x7f0000000280)=""/221, 0xdd}], 0x3, &(0x7f0000000580)=""/110, 0x71}, 0x100) semget$private(0x0, 0x207, 0x0) 07:55:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup(0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x12, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0) 07:55:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000001c0)={{0x40, 0x71, 0x52, 0x80, 0x80, 0xa5}, 0xffff, 0x8, 0x7bb, 0x6, 0x1ff8, "f01b72490cf1df7f2fb8853cf1205c580c47390b32ea4c3cd20e3cfa5690c58c222493954c1aaf45cc81e66505d4d1f2d5eb86266fa1179259b6f1a55c29935f7dede4d1405e582424a37122556a08129c06127aaa1e077062544bec47cd9c21982985a29d78aebfd27eb648f8b3ef7c294de8292d53862d0c4e52b7a6f5d2d0"}) pselect6(0x40, &(0x7f0000000280)={0x9, 0x18000000, 0x1, 0x9, 0x2, 0x1ba0, 0x7fffffff, 0x68}, &(0x7f00000002c0)={0x1, 0x74b, 0x4, 0x8001, 0x1ff, 0x2, 0xfffffffffffffffb, 0x3}, &(0x7f0000000300)={0x7fffffff, 0xffff, 0x6, 0x1, 0x1, 0x5, 0x9, 0x6}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={0x2}, 0x8}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000400)=ANY=[@ANYBLOB="020000000000000005000000040000000000000000000000030000007c0000000700000000f9ff0000000000000000000000000010ff01000001000001000000deab986a9300000000000000000600000004000000ac05000000000000000000000000000000000000000000000176af137c3ff5d0169300e5a83ecba2631e1d3aca0118348f770f204beaf0212281d4c686db94cf84fa46d074421adc8b2b988d510c02907993b29952d6648a1642bce9eee45aa5bdec27b2098843abadc5974c1de9dd8a3f5cfbef3e21b843733789a4c75dc310e4f6d60e4c6b6a3a9f815938ad648df9b520324e2b68a185c0077a86f199c0195a3db071a7f2ac05370922a41d3f44883c336d3a13745bb7703872401e2e8e410500a76e217ac7b7e57b5df0e95d5a04ff93055d590a667309283dfde190dbc455423b26cb3124f65a3eda37"]) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$EXT4_IOC_GROUP_EXTEND(r7, 0x40086607, &(0x7f0000000000)=0xadd) semget$private(0x0, 0x207, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 07:55:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup(0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:34 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfu\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x13, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 916.216991][T17602] Unknown ioctl -2147202861 07:55:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 916.323046][T17602] kvm [17601]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:55:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup(0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 916.373897][T17602] Unknown ioctl 1074820173 07:55:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0) 07:55:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x14, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:34 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfx\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 916.553732][T17627] Unknown ioctl -2147202861 07:55:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 916.661288][T17632] Unknown ioctl 1074820173 07:55:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x207, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:35 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) r4 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffffffff0001, 0x400) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="081600e600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x24) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000280)={r5, 0x33c0}, &(0x7f00000002c0)=0x8) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$selinux_load(r4, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "31f8ef7f860e36bfe422489abec76f968ce2953a8762efbd70df90f88e3295cac6c2e8ed466daa1330d7d3eaef8837c2c114de740b6567e1fc6712b57d56df19c58ad146ad7f029c74551c83cc441e7344de67f847ddac232e09baa39b83841b4a0b3bd1efc8ed9b356eeb77eb1fab8343eaeebe2877c1494fec0ccdb5629c53e7f441c02998fea8"}, 0x98) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 07:55:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x4800000000000000, 0x0, 0x0) 07:55:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:35 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x02', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:35 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000300)={0x1f, 0x6, 0x80, 0xfffffffd, 0x285}, 0x14) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\')\x00', r3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) flock(r5, 0x1) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r7}]]}}}]}, 0x4c}}, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9b80, 0x0, 0x0, 0x0, 0xd357}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x64}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ldst={0x0, 0x1, 0x0, 0x7, 0xa, 0x1, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xc, 0x2648fde6a99a1aab, 0x9}]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x0, 0x0, 0x82000, 0x4, [], r7, 0x15, r10, 0x8, &(0x7f0000000200)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xc, 0x2, 0x2}, 0x10}, 0x70) 07:55:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xf9, 0x3, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd7e41c4ae80421c3) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000680)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f00000006c0)=[@in={0x2, 0x4e22, @rand_addr=0x8}, @in6={0xa, 0x4e24, 0x3, @local, 0x20}, @in6={0xa, 0x4e23, 0x1, @rand_addr="df4e530bedb0417e38f794d5537e21bb", 0x45}, @in6={0xa, 0x4e22, 0x2, @remote, 0x3f}, @in={0x2, 0x4e24, @loopback}], 0x74) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000040}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xfc, r6, 0xb04, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4080}, 0x4000000) dup(0xffffffffffffffff) 07:55:35 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x03', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x4c00000000000000, 0x0, 0x0) 07:55:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:35 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="00fb9882f84b49bb181efa56470aa0efa8009a14061f07257fc365bbc96ec19a19a16e00b2a72b5d94a2d309cd272cfc754963441a68860937bab7486538ac881ea7804f1af021166c504b0d431d74000ce4c4feb37c311a4884bc04926d072a809a49325261f82ed90fd653ff531963cfed7051f7f8dde700001c34b659795b88c28ad253da5a855c1e824f4b4285a6e03d8ee30eb67b7d"], 0x98, 0x7) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000000)={0x0, 0x3}) dup(0xffffffffffffffff) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$CAPI_NCCI_GETUNIT(r6, 0x80044327, &(0x7f00000000c0)=0x4) 07:55:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:35 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = semget(0x0, 0x0, 0x100) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000240)=""/54) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x800) write$P9_RXATTRWALK(r2, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x733}, 0xf) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) r3 = geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000002c0)={{0x8, r3, r4, r5, r6, 0xef64b313579e7485, 0x8}, 0x6, 0x7, 0x4}) r7 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r7, 0x0, 0x11, &(0x7f0000000140)) r8 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r8, 0x0, 0x11, &(0x7f0000000140)) semctl$IPC_RMID(r8, 0x0, 0x0) 07:55:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x6800000000000000, 0x0, 0x0) 07:55:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:36 executing program 0: semget$private(0x0, 0x4, 0xaa3bf28db21fc9fb) restart_syscall() syz_open_dev$ndb(&(0x7f0000000040)='/dwv/nbd#\x00', 0x0, 0x410a01) 07:55:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:36 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x05', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:36 executing program 0: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) semget$private(0x0, 0x207, 0x0) 07:55:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0xf8c059285c4c9b9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009600)=[{{&(0x7f0000000180)=@llc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/21, 0x15}, {&(0x7f00000002c0)=""/199, 0xc7}], 0x2, &(0x7f00000004c0)=""/197, 0xc5}, 0xca9c}, {{&(0x7f0000000640)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000006c0)=""/221, 0xdd}, {&(0x7f00000007c0)=""/94, 0x5e}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/84, 0x54}], 0x4, &(0x7f0000001900)=""/152, 0x98}, 0x7fff}, {{0x0, 0x0, &(0x7f0000007c40)=[{&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000049c0)=""/75, 0x4b}, {&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/28, 0x1c}, {&(0x7f0000006a80)=""/116, 0x74}, {&(0x7f0000006b00)=""/70, 0x46}, {&(0x7f0000006b80)=""/4096, 0x1000}, {&(0x7f0000007b80)=""/32, 0x20}, {&(0x7f0000007bc0)=""/73, 0x49}], 0xa, &(0x7f0000007d00)}, 0x42}, {{&(0x7f0000007d40)=@caif=@dbg, 0x80, &(0x7f0000007e80)=[{&(0x7f0000007dc0)=""/155, 0x9b}], 0x1, &(0x7f0000007ec0)=""/239, 0xef}}, {{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007fc0)=""/100, 0x64}, {&(0x7f0000008040)=""/122, 0x7a}, {&(0x7f00000080c0)=""/158, 0x9e}], 0x3, &(0x7f00000081c0)=""/72, 0x48}, 0x80000000}, {{0x0, 0x0, &(0x7f0000009380)=[{&(0x7f0000008240)=""/112, 0x70}, {&(0x7f00000082c0)=""/138, 0x8a}, {&(0x7f0000008380)=""/4096, 0x1000}], 0x3, &(0x7f00000093c0)=""/135, 0x87}, 0x1}, {{&(0x7f0000009480)=@nfc_llcp, 0x80, &(0x7f0000009540)=[{&(0x7f0000009500)}], 0x1, &(0x7f0000009580)=""/115, 0x73}, 0x2}], 0x7, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000080)={0x9e0000, 0xe0aa, 0x3ff, [], &(0x7f0000000040)={0x9b0971, 0x40, [], @p_u32=&(0x7f0000000000)=0x1}}) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f00000000c0)={'syzkaller0\x00', 0x3}) r5 = socket$alg(0x26, 0x5, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r6, 0x0, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0xffffff2d) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r5, 0x0, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r10, 0x84, 0x7, &(0x7f0000007d00)={0xfff}, 0x4) r11 = dup(r7) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$EVIOCGBITSND(r11, 0x80404532, &(0x7f0000000200)=""/33) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x6c00000000000000, 0x0, 0x0) 07:55:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3c43, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', 'vboxnet1lo\x00'}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x600, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f00000000c0)=[0x4, 0x8000003]) dup(0xffffffffffffffff) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80), 0x3ffffffffffffef, 0x20000120, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000180)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0bc5351, &(0x7f00000001c0)={0x317, 0x0, 'client0\x00', 0x4, "158e8978444a8d72", "ee9b41711558aec7bd456a8d2e04a2e9d9f79c74cdb7525856b3689910e89d40", 0x7f, 0x4690}) 07:55:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:36 executing program 0: semget$private(0x0, 0x207, 0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000055c0)=[{{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/53, 0x35}, {&(0x7f0000000280)=""/228, 0xe4}, {&(0x7f00000004c0)=""/136, 0x88}], 0x3, &(0x7f0000000640)=""/144, 0x90}, 0x4}, {{0x0, 0x0, &(0x7f0000004b80)=[{&(0x7f00000003c0)=""/47, 0x2f}, {&(0x7f0000000580)=""/117, 0x75}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000700)=""/136, 0x88}, {&(0x7f0000001880)=""/175, 0xaf}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000005700)=""/115, 0x73}, {&(0x7f00000049c0)=""/227, 0xe3}, {&(0x7f0000005780)=""/17, 0x4}, {&(0x7f0000004ac0)=""/145, 0x91}], 0xa, &(0x7f0000004c40)=""/78, 0x4e}, 0x9}, {{&(0x7f0000004cc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000002980)=[{&(0x7f0000004d40)=""/88, 0x58}], 0x1, &(0x7f0000004dc0)=""/181, 0xb5}, 0x7}, {{&(0x7f0000004e80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000004f00)=""/169, 0xa9}, {&(0x7f0000004fc0)=""/138, 0x8a}, {&(0x7f0000005080)=""/57, 0x39}, {&(0x7f00000050c0)=""/75, 0x4b}, {&(0x7f0000005140)=""/217, 0xd9}], 0x5}, 0x7f}, {{&(0x7f00000052c0)=@nl=@proc, 0x80, &(0x7f0000005580)=[{&(0x7f0000005340)=""/190, 0xbe}, {&(0x7f00000057c0)=""/190, 0xbe}, {&(0x7f00000054c0)=""/137, 0xfffffffffffffff0}], 0x3}, 0x6}], 0x1, 0x0, 0x0) write$char_usb(r2, &(0x7f0000000000)="2b6805841ead5ad5ad42ec974d44025b7cd72bd58c482994066836", 0x1b) 07:55:36 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x06', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x3f, 0x1) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) 07:55:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7400000000000000, 0x0, 0x0) 07:55:36 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000000)=0x8, 0x4) r3 = dup(r1) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x278, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f0000000880)=""/4082, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$vhci(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="04e271aad281bed3bf2fa3445811326b99a809b99bdddeb4065d04df449f961da219faf63a3e630e9a0c73cb98e448051ba15b67ff98a3826afa734a623d307fc2dc6838bb13c44dbcd73c4a88846123b21b92b1d2ca29c4d2cb1a17f25364bc8188162d64cb7c869912d1d087c47b30c77b9a0c6f1bf90b8b35fb02289534006b370a4a304c00eb0f7a67068295a220bbe14e0ed73e15af6bb69e317e5b2f49dff159b4000000001bfaa4fc68208f1b396cc0f9854d98b67aab897dc3c14547a69ad2ecb892cb1e56ddcf607c36b8441f896f295882fb13f1174dac9ee864320a06d67cbd"], 0xfffffffffffffe77) 07:55:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000004) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x3f, 0x1) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) 07:55:37 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\a', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000180)=[0x7, 0x9, 0x20, 0xa7e2]) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000000000)=0x3ff, 0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000000)=0x10000) semget$private(0x0, 0x0, 0x71) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x540020) 07:55:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x0) 07:55:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x3f, 0x1) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) 07:55:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x3f, 0x1) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) 07:55:37 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\b', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) 07:55:37 executing program 0: clone3(&(0x7f0000000200)={0x80800, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x39, 0x0, &(0x7f00000000c0)=""/113, 0x71, &(0x7f00000004c0)=""/197}, 0x40) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r1 = dup(r0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0x58b}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0xfffffffffffffedb}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x20100, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$P9_RSYMLINK(r7, &(0x7f0000000240)={0x14, 0x11, 0x2, {0x22, 0x1, 0x4}}, 0x14) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r10, 0x401870cc, &(0x7f00000001c0)={0xfffffffffffffff8, 0x2, 0xffffffff, 0x8}) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000280)={0xfff, 0x0, "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"}) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x364) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r12 = accept$alg(r11, 0x0, 0x0) r13 = dup(r12) ioctl$TIOCSSERIAL(r7, 0x541f, &(0x7f0000000640)={0x10000, 0xfffffffa, 0x62d, 0x20, 0x4, 0xfffffd70, 0x1, 0xc2f9293, 0x894, 0x7f, 0x17, 0x2, 0x28, 0x3, &(0x7f00000001c0), 0x0, 0x7ff, 0xff}) write$UHID_DESTROY(r13, &(0x7f0000000080), 0xfff2) recvmmsg(r13, &(0x7f0000009d80), 0x3, 0x0, 0x0) ioctl$VIDIOC_S_CROP(r13, 0x4014563c, &(0x7f0000000180)={0x6, {0x3, 0xffffff7f, 0x3f}}) 07:55:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xc, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7e00000000000000, 0x0, 0x0) 07:55:37 executing program 0: ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000000)) semget$private(0x0, 0x207, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/200, 0xc8}, {&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f0000000400)=""/41, 0x29}, {&(0x7f0000000440)=""/190, 0xbe}, {&(0x7f0000000500)=""/8, 0x8}], 0x7, &(0x7f00000005c0)=""/4096, 0x1000}, 0x10020) 07:55:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1048, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x2, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:38 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\n', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:38 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0xc38b48ffb750034a) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000002c0)='btrfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000340)="ef3308787ec5ed7af07f1d3c8d1c8274a15a4a25e7288d63390a4de2296bded5", 0x20, 0x800000000000000}, {&(0x7f00000004c0)="c43b61856796d1cf0fdbcd5d857910920001eb3b9ba1c8514a3c1d3bb2dc34c483374d30a1d4968e7dd0c4be22d5a9f66f25172ad4fe6ee4554640200b091823f2dd79d7f1a6bb19a22b5aadf9a8813f9613c7c829d57daa3d0c372a209f616c1fdd455f756f13e8f2d8a51b5dfeb9cf1faf9e656e2fcdcb50bddb1a1d08eece003a15e5a8168124c5323d3f6321251b23e65fd70f626e2a8217467883b2bdaf9457f1aff95b506cabc65b7731627052b44d1bf79c4fb133f6afede6b8fc81adc8df466f0e3d17d1476139242f7e2a92836beede7848e7a615", 0xd9}, {&(0x7f0000000640)="d2d520211d7ed6aeace90854873a5683543f3f331928dbbecbf3d6a40e01c200ed3b52218406f8b06d92c3fd7078bd7790002c135be48dad7b9bec74114f5597f6e88222bad18258019f6aa33c050cf79b7f4cb48abb1614950528e7ea31aabc24efe037f4daa10e252320b30b22ecb7669ae3eeaa2d295e2f9e64e486a34f805a6c31ad47a15ab16410045bdbcd7142f08504521b78a7a4ae46828a9e653f0522ebaf49f4361e8923f848a7fc6afaf7887e3938ff97ac944a54d9209f92259637ffbcd24f53", 0xc6, 0x4}], 0x1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f00000000c0)) read$char_usb(0xffffffffffffffff, &(0x7f0000000140)=""/69, 0x45) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) r5 = socket$isdn(0x22, 0x3, 0x3) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000100)={0x0, 0x2, 0x6}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89a3, &(0x7f0000000280)={'gretap0\x00', @ifru_mtu=0x3}) r6 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x0, 0x1) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000c40)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x6c, &(0x7f0000000c80)={@broadcast, @remote, 0x0}, &(0x7f0000000cc0)=0xc) sendmmsg$inet(r7, &(0x7f0000002480)=[{{&(0x7f0000000740)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000780)="80868025c53a0c23a8ef9b6e5b554c4e9f2167b1a0b599f3f5268f3e67153a571b18ee3de2c80e20a16202988ea6dfdb4bb6449fdf74ffb0238fba270f44f0123a27acaf21b5945b99d7b761b24d4ca59c3cbf1f7984d4482f4880337af0bfa3741299256b09e876189c26d70e174f6d771a655d21165bef1de1bad5372891c147b8ba72345e5cee6c734cac0d421e553d9887d37ee2dd72e62b", 0x9a}, {&(0x7f0000000a80)="978e034810b06244d33d50a03999fc07a2fd149d08356f3b0fa2cd67257937873942b7b944cb3f569dc077d45f64348c5a79dfcd9a553200e0f62d4a5a8d5e13254ea9116513c50dc72634d9cfaff8cc7d64c0855fadc798a32bc1d8d3450cba99b04b1389749902e642f7a36bd9904ea5c2f0392c449a9f895b23254589dfe9e983b7200f2a847b708dff682c3a133234502d01d812304914010c4dd81e0cd4428bcec47100531d33b1fea92f4eb3577c83f729dde21ddb5bb508179e12c8247b6f5a1cd5c9cf1bc44596f7c8a888da0e393e499565f867d3c623617222bd9e53c2161bdfa74a9f9d5e8d", 0xeb}], 0x2, &(0x7f0000000d00)=[@ip_retopts={{0x98, 0x0, 0x7, {[@rr={0x7, 0x7, 0x2, [@rand_addr=0x6]}, @ra={0x94, 0x6, 0x3}, @cipso={0x86, 0x25, 0xffffffff, [{0x0, 0x9, "c86698d130b053"}, {0x0, 0x7, "598282c029"}, {0x5, 0xf, "f6eb86a82aae74393bc5344642"}]}, @ra={0x94, 0x6}, @timestamp={0x44, 0x34, 0x7, 0x1, 0x9, [{[@multicast1]}, {[@remote], 0x1}, {[@loopback], 0xfffffffb}, {[], 0x6}, {[], 0x1}, {[], 0x101}, {[], 0x8000}, {[@rand_addr=0x8], 0x200}]}, @timestamp={0x44, 0x8, 0x1, 0x1, 0x7, [{[], 0x2}]}, @lsrr={0x83, 0x13, 0x3f, [@rand_addr=0x8, @rand_addr=0x3, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x27}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast2, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @rand_addr=0xfe, @remote}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5, 0x3, 0x9, [{[], 0x3}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x120}}, {{0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000e40)="308b7b3456876641a28d243f58e022f7c80137174bb2a3a311714f45d94ab78abe7e07cf246fa443345a6e05e1742b8096076717949a202548660fd164e836af577d9b19651944def65a2d84424c897bd59746544ccb9a3eb8779ca27b861f6265c26051a47c74a27537f9502fc244a332b30ca4a28192f658a027ea1da60902da12b42067f79a3944ee42672d69681c5cc2824140a471e0f3ef4bf37fccb39cba709df7b16bb2f98bd0d9042442c2469f", 0xb1}, {&(0x7f0000000f00)="94b7a4e32477f2c601878a601d751bf1684bb9ec1df16584daa842df8a4d163d2cdd83d5bb5ce84980155507285038618ecc4a702be43ef33ea1f6be9f549947ce8cc0da80426cb8308712142b67f22f707132143a04b063d877617817d2aa1a93af0ae902cbe0c94ac2bc7225beecbec0756018dd4d37838c1ce426bfc2a1bfb292e071aa016b4e96dc8ae58c42b8071e4b3611d5848242ddd1", 0x9a}, {&(0x7f0000000fc0)="eb9989849f18d4ef99aad737fe05e8e585bd7fc068a3c9d6430c1a1aafa8ddf260876bc15b565532ae7d1849af7855ddfeee1965b4a4aa5c189ffc5cc0365f691aa81e6c797090a642d1e1290f9bd4a1d73b07cfc4c2383082e25e79df4c320568a840dc053b2702a1d357ae27eb1a2e1ecf9b4da125c254ee866e4b88f11016d5afd8786f5a56008446bcbbadf003557eb59ca2388ee752ea6ab4a9fe9c14a776d2556030da9753062a9e98a9e5b358224a3d248d35c9732a6e297475e04299250795608281eb3a764af3ad512ee86bf38d65e1cb17a4ba316c", 0xda}, {&(0x7f00000010c0)="4caf1d43d2b9ff3ed7381ed7d1b5714593dcf2e23336c4400d945c660d14b6fc56837d0bd49571cbee6a928809af254a83760f5620ef11eae0ba6113d903b759f5cdea1c9d0931630cb43b2589e565d13a675cfa30abda669f8bb0a1b35f8c74300f5d441682b386daed116ce904e592708edc04340d37b15866ebd4c6132eb28b716be72c87d26a027bb0cc255de59841b2f465ba4cbd50a8b15efcf10319f3cb1dce3ac2721cdf977d627cd9a415548acc", 0xb2}, {&(0x7f0000001180)="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", 0x1000}, {&(0x7f00000049c0)="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", 0x1000}, {&(0x7f00000059c0)="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", 0x1000}, {&(0x7f0000002180)="f35aef714db63533864d77a863291c5be5902c40192ce51fe0a68b65cb127416f666c55e8910c15926c66d839b3ef49bc700a5a0d12d23b09333d95e7e3adc44b3acb6c952c2e34a4a63064fa36e9896da8eefb083bbb2a8a9bfa2e8e4442ba51f0c1eda97139e249106f9e8e33287cb0ca03a3ab405b465f30b3c4dc42cf77006bce5fba052", 0x86}, {&(0x7f0000002240)="6e20b2ad7fb728212069ee439ee4a40c0d1a09e55d52619377a49684f7f21358c683486e819f7e970acbfefb36304091ffc508af90fc0ded23bd1c749e2b36c98a4460694cb0dc0c8acb548d6930ba2ba8e6ce6d1b4dacb78f522a809d45bf4ecf2f9d7445d102f39c1f53ca058a83611acab0e8b7838ae9cda949eae4a9c3189ec92e720cc211", 0x87}], 0x9, &(0x7f00000023c0)=[@ip_retopts={{0x58, 0x0, 0x7, {[@rr={0x7, 0x13, 0x40, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @lsrr={0x83, 0x7, 0x9, [@local]}, @rr={0x7, 0x1b, 0x68, [@local, @multicast1, @multicast1, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @local]}, @ssrr={0x89, 0x13, 0x8, [@multicast1, @dev={0xac, 0x14, 0x14, 0x14}, @rand_addr=0x4, @dev={0xac, 0x14, 0x14, 0x29}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x88}}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r6, 0x40505331, &(0x7f0000000880)={{0x73, 0x6}, {0x73, 0xa7}, 0x1, 0x1, 0x6}) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000001c0)=0x10, 0x4) 07:55:38 executing program 1 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:38 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = dup(0xffffffffffffffff) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r9, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000040)={r9, 0x2, 0x1, 0x8000}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000000c0)={r10, 0x9}, 0x8) 07:55:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0) 07:55:38 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x0e', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) semtimedop(r0, &(0x7f0000000000), 0x0, &(0x7f0000000040)={0x77359400}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x2}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xff00000000000000, 0x0, 0x0) 07:55:38 executing program 0: semget$private(0x0, 0x4, 0xe5cc479dc2d761ac) 07:55:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:38 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x10', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0xa}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x1, 0xfd, 0x0, 0x0, 0x0, 0x2}, 0x2, 0x2}, 0xe) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_INITMSG(r8, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r9 = accept$alg(r1, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0x4e3e) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$TIOCSISO7816(r10, 0xc0285443, &(0x7f0000000340)={0x8001, 0x0, 0x3, 0x1000, 0x3}) getsockopt$inet6_mtu(r10, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$MON_IOCX_MFETCH(r10, 0xc0109207, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0], 0x2, 0x1}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xf5, {0x9, 0x0, 0xdc, 0x20, 0x5, 0x8}, 0x8, 0xff}, 0xe) 07:55:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r5, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r5, 0x44, "f40bfa", "3758da04e47dacc285d784666cd242bb7fdd994c5ed613a1d535ac404e094010e525d3b58f3d47b83acad9cf329c35d6eed393220d658806c965914906bce0c8a3e61e62b4a50b425e4e49f0564d714175dbfed59be71046fe050bca55ce1f80781b5b7fc1423bf10d0e02d61b4d72ddce9fcebeaaa0c8a6e6a8d3056aa474f66289e705303650d66bb7290e008498721e6d72dd76d19b3584f79f84d628dcde06579f8cc0e727bcb3d5b3c6c8dfbbf4080365e285f7aa11f069f5a6364586c8d554f404a3e6b70c1aa6bcfe9d91364001cc627b17cc3514a429a55297e7b326059fae0e188f3b4fe2d90c5c7d43dba5e03a3838d1646aad9859533b87c13703"}}, 0x110) 07:55:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xffefffffff7f0000, 0x0, 0x0) 07:55:39 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfsH', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x2}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='system,\x00', 0xfffffffffffffffa) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0xf000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = accept$alg(r1, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0xffffff26, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4, 0x0, 0x227}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r5, 0x40505330, &(0x7f0000000100)={{0xac, 0x5}, {0x2, 0x4}, 0xffffffff, 0x4, 0x1}) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='.request_key_auth\x00', 0x0) 07:55:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x2e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x20100, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xf3, 0x420800) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x109, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'ib', 0x3a, 'nr0\x00'}}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x4) semget$private(0x0, 0x207, 0x0) dup(0xffffffffffffffff) 07:55:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x110}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0) 07:55:39 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfsL', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) getpeername$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) 07:55:39 executing program 0: r0 = semget$private(0x0, 0x1, 0xf0) semtimedop(r0, &(0x7f0000000000)=[{0x1, 0x3}, {0x3, 0x2, 0xc9e74c27798bbe60}, {0x1, 0x101, 0x800}, {0x2, 0xff6f, 0x1000}], 0x4, &(0x7f0000000040)) semctl$SEM_INFO(r0, 0x6, 0x13, &(0x7f0000000080)=""/91) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000140)={0x9, 0x7, 0x7ff, 0x6}, 0x10) semget$private(0x0, 0x207, 0x0) 07:55:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x1001}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c00000010000507000000000800000000000000900a1305cb0901ab2cdc164bcf37e41d95d3fa46c2d2310d52479fea6e8d3e204e5904765789624b7ea15f0d2d731a423912a2785235d2932834c92222bf7c5d8076c3ec866386d3ee60da485fbe082cfac4183ce35b69eb73ece07173c954fa994abd8122d71f4584b090627d92b2fe7e00aecdb9613d2a44a6ba53fbd14dfb8b41eedfe1b136a5", @ANYRES32=0x0, @ANYBLOB="00000000000000002c00120008000100736974002000020014000d00fe88000000000000000000000000000108000200", @ANYRES32=r9], 0x4c}}, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB="66642716bf4259c72234ff63973002923107c16c37d6a1b500db29e6b3bf2b944f6ba1cade5173d31cbf8d401f098267b830835dd0fa194a9d5cf9c771", @ANYRESHEX, @ANYBLOB=',rootmode=0000000@00000000004000', @ANYRESDEC=r10]) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in6=@local, 0x4e23, 0x401, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x0, r9, r10}, {0x7, 0x2, 0x2, 0xa6a, 0x8, 0x1000, 0x1, 0xffffffff}, {0x7, 0xffffffffffffffc0, 0x7, 0x7}, 0x101, 0x6e6bba, 0x0, 0x0, 0x2}, {{@in=@remote, 0x4d4, 0xcb87fad1eb55acc3}, 0x2, @in=@multicast1, 0x3507, 0x1, 0x1, 0xff, 0x9, 0x6, 0x6}}, 0xe8) r11 = dup(r3) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r11, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000380)={r12, 0x9ac, 0x4, [0xfffd, 0xfff, 0x4, 0x5a8b]}, &(0x7f0000000180)=0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:40 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs`', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:40 executing program 0: semget$private(0x0, 0x207, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) 07:55:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xffffffffff600000, 0x0, 0x0) 07:55:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:40 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) mknodat(r2, &(0x7f0000000000)='./file0\x00', 0xc000, 0x2) 07:55:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x2}}, 0xe) setresgid(0x0, 0x0, 0x0) [ 922.410169][T18033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 07:55:40 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfsh', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 922.545311][T18054] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 07:55:40 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/4096) 07:55:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="82260c16", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r9}, &(0x7f0000000180)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{&(0x7f0000000380)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/223, 0xdf}], 0x1, &(0x7f0000000640)=""/115, 0x73}, 0xa56}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/99, 0x63}, {&(0x7f0000000740)=""/205, 0xcd}, {&(0x7f00000005c0)}, {&(0x7f0000000880)=""/237, 0xed}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000a80)=""/165, 0xa5}], 0x6, &(0x7f0000000bc0)=""/250, 0xfa}, 0x4e8}, {{&(0x7f0000000cc0)=@generic, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000d40)=""/22, 0x16}, {&(0x7f0000000d80)=""/197, 0xc5}, {&(0x7f0000000e80)=""/96, 0x60}, {&(0x7f0000000f00)=""/34, 0x22}], 0x4, &(0x7f0000000f80)=""/37, 0x25}, 0x2}, {{&(0x7f0000000fc0)=@xdp, 0x80, &(0x7f0000001040)}, 0x9}, {{&(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/87, 0x57}], 0x2}, 0x4b3e}, {{&(0x7f00000021c0)=@caif=@util, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002240)=""/212, 0xd4}, {&(0x7f0000002340)=""/126, 0x7e}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000002400)=""/132, 0x84}], 0x4}, 0x200}, {{&(0x7f0000002500)=@pppol2tpv3in6, 0x80, &(0x7f0000002780)=[{&(0x7f0000002580)=""/54, 0x36}, {&(0x7f00000025c0)=""/24, 0x18}, {&(0x7f0000002600)=""/236, 0xec}, {&(0x7f0000002700)=""/84, 0x54}], 0x4, &(0x7f00000027c0)=""/208, 0xd0}, 0x3}, {{&(0x7f00000028c0)=@nfc_llcp, 0x80, &(0x7f0000002940)=[{&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f00000059c0)=""/233, 0xe9}, {&(0x7f0000005ac0)=""/246, 0xf6}], 0x3, &(0x7f0000002980)}, 0xf2c}], 0x8, 0x40, &(0x7f0000005dc0)={0x77359400}) r11 = syz_open_dev$admmidi(&(0x7f0000005f00)='/dev/admmidi#\x00', 0x8, 0x202000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r11, 0x84, 0x6d, &(0x7f0000005e00)={r10, 0x2d8, "2a0ddfa5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9ffaaa0514d84b9477247ea9f9c834413ec27ae82955521a7ede8a5421a3e86544181c4b190000008000000000f0327a64600732a6ba36c9f4240233559ee9e8ed78ffffffff1e842ea92fb4c3e507000000f6519c4b46f94ef4ca5ff89fe5000000000000000000"}, &(0x7f0000000340)=0xfffffffffffffd89) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000000)={r9, 0x5}, 0x8) r12 = dup(r2) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000080)='cpuset.mem_hardwall\x00', 0x2, 0x0) read(r13, &(0x7f0000000180)=""/140, 0x8c) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2) 07:55:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:40 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfsl', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x9, 0x21, 0x8, 0x7ff, 0x8, 0x69, 0x7, 0x760}, &(0x7f0000000040)=0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$IMGETDEVINFO(r5, 0x80044944, &(0x7f0000000180)) 07:55:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2}}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3) 07:55:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 0: semget$private(0x0, 0x207, 0x200) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x80000000, 0x40) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x4, 0xb6, 0x3, 0x7fff, 0x0, 0x8, 0x5, {0x0, @in={{0x2, 0x0, @empty}}, 0x2, 0x1000, 0xba, 0x5, 0x89dd5979}}, &(0x7f0000000100)=0xb0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB="66642716bf4259c72234ff63973002923107884af9c852b2783ac2c16c37d6a1b500db29e6b3bf2b944f6ba1cade5173d31cbf8d401f098267a830835d", @ANYRESHEX, @ANYBLOB=',rootmode=0000000@00000000004000', @ANYRESDEC=r8]) write$P9_RSTATu(r5, &(0x7f0000000580)={0x74, 0x7d, 0x2, {{0x0, 0x56, 0x6, 0x3, {0x20, 0x3, 0x7}, 0x16000000, 0x8, 0x8, 0x1, 0xd, '/dev/dmmidi#\x00', 0x0, '', 0xd, '/dev/dmmidi#\x00', 0x9, 'skcipher\x00'}, 0x9, 'skcipher\x00', r6, r7, r8}}, 0x74) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$ppp(r11, &(0x7f0000000180)="52f8bfc116ca72c0141ffb638a6af1cd1dccdbb7c1400293858f08eb41d172e7cf478ac8bc03d675acaeda6614b788712761ee9f367bb73e6b3dfe2424a989eae0d0172dc62722ece3fc1b027521993d51a95a6a6583f11beda3afc92deb86faae4b15e5a5cbfa45c537a33551cf914de580458a1a7a54a1d6673eebe3e43cda0b4da36ab42c7228a60de715adb17d18729305460b87914af038e35593988379", 0xa0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x5}, 0x8) 07:55:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) dup(0xffffffffffffffff) 07:55:41 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfst', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) r3 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r3, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f) writev(r3, &(0x7f0000000580)=[{&(0x7f00000000c0)="ee", 0xc}], 0x1) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x1d, &(0x7f0000000240)=0x1, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/96, 0x28b}], 0x1) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f0000000000)={{0x0, @addr=0x2}, "dd5612ecf711f40d7e070b00db30ee46d579e8d16c47d889658f5a8efeacb3ca", 0x2}) semget$private(0x0, 0x207, 0x0) 07:55:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x2}}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4) 07:55:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) semget$private(0x0, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f00000000c0)) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r1, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, r8, 0x439, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa708100}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="e8000000", @ANYRES16=r8, @ANYBLOB="00042bbd7000fedbdf250100000060000100080002001d000000080001000a00000008000b0073697000080004004e2200000800080000000100080004004e210000080004004e220000140003000000000000000000000000000000000008000b0073697000080005000000000008000600040000004c000300080004000400000008000300010000000800030001000000000714000600ff0200000000000000000000000000011420311c26788e07093b92593d32e5000600fe8000002000000000000000000000bb080006000200000008000400070000000800"], 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:41 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfsz', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:41 executing program 0: semget$private(0x0, 0x1, 0x19) 07:55:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x5) 07:55:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x2}}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:42 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x207, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200800, 0x0) getsockopt$inet_int(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) dup(0xffffffffffffffff) [ 924.271524][T18187] XFS (loop3): Invalid device [.], error=-15 07:55:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:42 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x32, @rand_addr=0x2, 0x4e21, 0x0, 'rr\x00', 0x0, 0x7, 0x75}, 0x2c) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r6, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r6, 0x6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={r7}, &(0x7f00000000c0)=0x8) [ 924.391336][T18187] XFS (loop3): Invalid device [.], error=-15 07:55:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6) 07:55:42 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:42 executing program 0: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) semget$private(0x0, 0x207, 0x0) [ 924.761327][T18218] XFS (loop3): Invalid device [.], error=-15 07:55:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000001c0)={0x1, 0x2, 0x7, "e58962e0059c8bf5574ee8d2af0597ef7c5a03e7c50bee620eb6c2c54b1e4841dd59ea940f99d6a809ad354d974d25f88f692d6220d9c4a73478721d", 0x22, "346c577d06a8eec32851ecec2d23ea10dfc149a137f3a79fd0549550722ce30a52e089c85d6c5ee2f9e3b7ec4463a9e0aea5523ae75756ace44d0be0", 0x10}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) write(r4, &(0x7f0000000000)="8408b0645580e919b9fb11a67987e523bb8e2d644bcc3be7a8e6a41d600a2ac13ce1685e307b1fd30a98eaae5363fc107fc8d8681b2880faec188fdf4806db545629f75d6eb6d80ffddadee787ee5c52bc6a2ae995a31682a1c7ce58a0c23984b51bea43b53e12fff13bc0cd1fe016e62fadeb3da36d9a5009bdee1dc54d2ba69c27b418c15303234ab895224641de4469331840b118e995e5ad21a1f98b4ed3d48bf66c905a5c", 0xa7) dup(0xffffffffffffffff) 07:55:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 924.854664][T18218] XFS (loop3): Invalid device [.], error=-15 07:55:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7) 07:55:43 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:43 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x54f4) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) semget$private(0x0, 0x207, 0x0) [ 925.151081][T18240] XFS (loop3): Invalid device [.], error=-15 07:55:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 925.240151][T18240] XFS (loop3): Invalid device [.], error=-15 07:55:43 executing program 0: semget$private(0x0, 0x4, 0x200) 07:55:43 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x8) 07:55:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:43 executing program 0: 07:55:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 925.633435][T18264] XFS (loop3): Invalid device [.], error=-15 [ 925.741519][T18264] XFS (loop3): Invalid device [.], error=-15 07:55:43 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:43 executing program 0: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x5) semget$private(0x0, 0x207, 0x0) 07:55:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xa) 07:55:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 926.001154][T18285] XFS (loop3): Invalid device [.], error=-15 07:55:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x110}, 0xe) setresgid(0x0, 0x0, 0x0) [ 926.081070][T18285] XFS (loop3): Invalid device [.], error=-15 07:55:44 executing program 0: ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000000)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) waitid$P_PIDFD(0x3, r6, &(0x7f0000000180), 0xf407dcd99114f58a, &(0x7f00000004c0)) r7 = accept$alg(r0, 0x0, 0x0) r8 = dup(r7) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bind$alg(r11, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x38, r13, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r8, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10400800}, 0xc, &(0x7f0000000300)={&(0x7f0000000880)=ANY=[@ANYBLOB="9f020000", @ANYRES16=r13, @ANYBLOB="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"], 0x288}, 0x1, 0x0, 0x0, 0x2}, 0x20000000) semget$private(0x0, 0x0, 0x8) 07:55:44 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x1001}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 926.378059][T18305] XFS (loop3): Invalid device [.], error=-15 [ 926.463727][T18305] XFS (loop3): Invalid device [.], error=-15 07:55:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)) msgsnd(r2, &(0x7f0000000780)={0x3, "ce3b82a6047332c53ff1643d3685e96ff5633d0884233f8823bad7e5f65531a4755888845c6aaa19319cb892e655ae47d17e7a182a32e9002eab760c3c2272bd8cbea8746af5c39123c80884ffd4b15e1455ead40e9f77f39f7b1e15e6951bf27e400c62384b08bbc3b2e8f36c3e534e7c30f65c3517b18ba928108eac7793350dc503d653906764ad59f5d4937cdc1cf51cb8e3db0bed0141b9a539a6d31cbf8743689b17"}, 0xad, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) r4 = getgid() fcntl$getownex(r1, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = msgget$private(0x0, 0x0) msgrcv(r7, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f0000258f88)) msgsnd(r7, &(0x7f0000000780)={0x3, "ce3b82a6047332c53ff1643d3685e96ff5633d0884233f8823bad7e5f65531a4755888845c6aaa19319cb892e655ae47d17e7a182a32e9002eab760c3c2272bd8cbea8746af5c39123c80884ffd4b15e1455ead40e9f77f39f7b1e15e6951bf27e400c62384b08bbc3b2e8f36c3e534e7c30f65c3517b18ba928108eac7793350dc503d653906764ad59f5d4937cdc1cf51cb8e3db0bed0141b9a539a6d31cbf8743689b17"}, 0xad, 0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) r9 = getgid() fcntl$getownex(r6, 0x10, &(0x7f00000003c0)={0x0, 0x0}) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000700)={{0x6, 0x0, 0x0, r8, r9, 0xc3, 0x5}, 0x4, 0x9, 0x3, 0x8001, 0x2ef, 0x800, 0xffffffffffffffff, r10}) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000700)={{0x6, 0x0, 0x0, r3, r4, 0xc3, 0x5}, 0x4, 0x9, 0x3, 0x4000000000008005, 0x5, 0x800, 0xffffffffffffffff, r5}) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000000)=""/101) 07:55:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x48) 07:55:44 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) semtimedop(r0, &(0x7f0000000000)=[{0x5, 0x81, 0x800}, {0x0, 0x3}, {0x4, 0x101, 0x800}, {0x1, 0x9, 0x1000}, {0x1, 0x2, 0x800}], 0x5, &(0x7f0000000040)) 07:55:44 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs ', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r2, 0x4030560b, &(0x7f0000000200)={0x8, 0x40, &(0x7f0000000100)="34b52d721d268764f7d4a14501f76c3fb4012848b566647a1f048465d477fdda7aa9437bf01c8962ea72d851e070b25cce43fc7e386f103b410f18739847922a2807b3f3b20eec87da3f1a936d2f273caff278ec75c11abecc2294732dc8b6d4a4c0cc8949becfde1923449289aabe49cb7050895ef6d1baa06cc85e1f59e2dd2516ce6f1001ccdcb9569f397c715a0902db1f7fed4ab5ace864e5e08d12c6870a383cd6f09e01121bee6f924c98b826568ce9db838488de34bc62c4b133a18d63b3cf7186fca26c0dac14c40bd85ccfe8c9485e10a9de7a0a6122d0", {0xbd, 0x1, 0x31384142, 0x3, 0x3ff, 0x2bd, 0xa, 0xfffff621}}) semget$private(0x0, 0x207, 0x1) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000000)='.dead\x00', 0xfffffffffffffffd, &(0x7f0000000040)="6d5ec2f53323bf24c1c1e71986d51b52e0069fc71faf1e1be9102e9f24702908e44e2a634deef36210aaf2fb20750b345727cdf1e0c3704e63101bc749fd2fd4945c41a09f22195de3ef3e7ca47b91c3e31fcbe2715f6af3e5a6a4ca9ee3aef7c25bd72bb9a70643917c55436cf44e1e78826873fd07caea4f78064694979763659f43c345af16fb3907bb80bdccd2a387fdf1cbad0de00075ddb0faa0cf913619971e3ec5094b285c3643d71f408c4c3e16", 0xb2, r3) keyctl$instantiate(0xc, r4, 0x0, 0x0, 0xfffffffffffffffd) 07:55:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) setresgid(0x0, 0x0, 0x0) 07:55:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) modify_ldt$read(0x0, &(0x7f0000000000)=""/33, 0x21) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) semget$private(0x0, 0x0, 0x0) 07:55:45 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0x2000000e) setresgid(0x0, 0x0, 0x0) [ 927.162763][T18367] XFS (loop3): Invalid device [.], error=-15 [ 927.247255][T18367] XFS (loop3): Invalid device [.], error=-15 07:55:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4c) 07:55:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) semget$private(0x0, 0x207, 0x0) 07:55:45 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext={0x7, 0x80000001}, 0x0, 0x0, 0x80, 0x0, 0x80000001, 0x0, 0x1000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000000c0), 0x4) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x20100, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x5, 0x8, 0x6, 0x2, 0x0, 0x1, 0x14c404, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_bp={&(0x7f0000000080), 0x3}, 0x9a08, 0x7fff, 0x5, 0x0, 0x60000, 0x5a, 0x963}, r4, 0x8, r0, 0x2) bind$bt_l2cap(r3, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:45 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x10', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000000)=')-{$vboxnet1\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)) msgsnd(r2, &(0x7f0000000780)={0x3, "ce3b82a6047332c53ff1643d3685e96ff5633d0884233f8823bad7e5f65531a4755888845c6aaa19319cb892e655ae47d17e7a182a32e9002eab760c3c2272bd8cbea8746af5c39123c80884ffd4b15e1455ead40e9f77f39f7b1e15e6951bf27e400c62384b08bbc3b2e8f36c3e534e7c30f65c3517b18ba928108eac7793350dc503d653906764ad59f5d4937cdc1cf51cb8e3db0bed0141b9a539a6d31cbf8743689b17"}, 0xad, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) r4 = getgid() fcntl$getownex(r1, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = msgget$private(0x0, 0x0) msgrcv(r7, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f0000258f88)) msgsnd(r7, &(0x7f0000000780)={0x3, "ce3b82a6047332c53ff1643d3685e96ff5633d0884233f8823bad7e5f65531a4755888845c6aaa19319cb892e655ae47d17e7a182a32e9002eab760c3c2272bd8cbea8746af5c39123c80884ffd4b15e1455ead40e9f77f39f7b1e15e6951bf27e400c62384b08bbc3b2e8f36c3e534e7c30f65c3517b18ba928108eac7793350dc503d653906764ad59f5d4937cdc1cf51cb8e3db0bed0141b9a539a6d31cbf8743689b17"}, 0xad, 0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) r9 = getgid() fcntl$getownex(r6, 0x10, &(0x7f00000003c0)={0x0, 0x0}) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000700)={{0x6, 0x0, 0x0, r8, r9, 0xc3, 0x5}, 0x4, 0x9, 0x3, 0x8001, 0x2ef, 0x800, 0xffffffffffffffff, r10}) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000700)={{0x6, 0x0, 0x0, r3, r4, 0xc3, 0x5}, 0x4, 0x9, 0x3, 0x4000000000008005, 0x5, 0x800, 0xffffffffffffffff, r5}) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000000)=""/101) 07:55:45 executing program 0: semget$private(0x0, 0x207, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)=""/3, &(0x7f0000000040)=0x3) socket$inet6_udplite(0xa, 0x2, 0x88) 07:55:45 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'eql\x00', &(0x7f0000000000)=@ethtool_cmd={0x40, 0xc7, 0x0, 0xff80, 0x9, 0x7, 0x40, 0x9, 0xa9, 0x40, 0xfaf, 0x45, 0xf4de, 0x81, 0x6, 0x88, [0x0, 0x4]}}) dup(0xffffffffffffffff) 07:55:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x68) 07:55:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) socketpair$tipc(0x1e, 0x37924b7822431e7b, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000053c0)=[{{&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, &(0x7f00000012c0)=""/183, 0xb7}, 0xffff}, {{&(0x7f0000001380)=@x25, 0x80, &(0x7f0000001440)=[{&(0x7f0000001400)=""/44, 0x2c}], 0x1}, 0x97f}, {{&(0x7f0000001480)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001500)=""/40, 0x28}, {&(0x7f0000001540)=""/120, 0x78}, {&(0x7f00000015c0)=""/204, 0xcc}], 0x3}, 0x1b5}, {{&(0x7f0000001700)=@hci, 0x80, &(0x7f0000002780)=[{&(0x7f0000001780)=""/4096, 0x1000}], 0x1, &(0x7f00000027c0)=""/5, 0x5}, 0x200}, {{&(0x7f0000002800)=@un=@abs, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000002880)=""/7, 0x7}, {&(0x7f00000028c0)=""/199, 0xc7}, {&(0x7f00000029c0)=""/47, 0x2f}, {&(0x7f0000002a00)=""/184, 0xb8}, {&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/135, 0x87}, {&(0x7f0000003b80)=""/154, 0x9a}, {&(0x7f0000003c40)=""/104, 0x68}, {&(0x7f0000003cc0)=""/221, 0xdd}], 0x9, &(0x7f0000003e80)=""/4096, 0x1000}}, {{&(0x7f0000004e80)=@x25, 0x80, &(0x7f0000005140)=[{&(0x7f0000004f00)=""/187, 0xbb}, {&(0x7f0000004fc0)=""/168, 0xa8}, {&(0x7f0000005080)=""/170, 0xaa}], 0x3, &(0x7f0000005180)=""/204, 0xcc}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000005340)=[{&(0x7f0000005280)=""/60, 0x3c}, {&(0x7f00000052c0)=""/85, 0x55}], 0x2, &(0x7f0000005380)=""/53, 0x35}, 0x4}], 0x7, 0x40012002, &(0x7f0000005580)={0x0, 0x1c9c380}) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:46 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x100000000, 0x204201) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000140)={0x3fe, 0x8bc, &(0x7f0000000000)="3e3fa7bfc9fe4b56d9e4c8bf20afd53b5d48f450bb470d8b09be2cbf271ae25bef5e7060f12031a4c09cd790f938f7f194cc98283eb121fc6917cc9b8298e8916b2f008eb9a193b3f97310cd4aa412c369800f51344bb301573fcf5f8ba7d6695f31e310e065093d759ae959e7ddb427530d99", &(0x7f0000000080)="09269a2f5009fca66888903e0afd97f9ea8d53085cb3c56fdea224f4bb25af05bf503b2d704fab636dd0794f6c96b38cfac314d754f34f7c7f56b5c3cd990b2e378ad1856e38abc5b5819688b8c53ddbf1cc0f809b0b5fedec194b83ff6ba73fc7a90c", 0x73, 0x63}) semget$private(0x0, 0x207, 0x5) [ 928.012442][T18427] XFS (loop3): Invalid device [.], error=-15 07:55:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000040)=r1, 0x1) 07:55:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x120000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000180)) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 928.158198][T18427] XFS (loop3): Invalid device [.], error=-15 07:55:46 executing program 0: semget$private(0x0, 0x207, 0x8) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2000, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r5, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r5}, 0x8) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e23, @empty}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xa, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x510, 0x3ff}) 07:55:46 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6c) [ 928.480304][T18462] XFS (loop3): Invalid device [.], error=-15 [ 928.550204][T18462] XFS (loop3): Invalid device [.], error=-15 07:55:46 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000040)=r1, 0x1) 07:55:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:46 executing program 0: ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4008550d, &(0x7f00000001c0)) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x121400) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x657be2ffe0a1bdd8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x10001}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffff7}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x500000}, &(0x7f0000000240)=0x8) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r8}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r8, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r4, 0x2, 0x0, 0x9, 0x401, 0x1000, 0x9, 0x1ff, {r8, @in6={{0xa, 0x4e23, 0x200, @ipv4={[], [], @rand_addr=0x2f}, 0x100}}, 0x2, 0x0, 0x400, 0x9, 0x1}}, &(0x7f0000000340)=0xb0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r13 = openat$cgroup_ro(r12, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x0, &(0x7f0000004dc0)={@local, 0x0}, &(0x7f0000004e00)=0x14) r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r15, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r16 = accept$alg(r15, 0x0, 0x0) r17 = dup(r16) write$UHID_DESTROY(r17, &(0x7f0000000080), 0xfff2) recvmmsg(r17, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) accept4$packet(r17, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004e80)=0x14, 0x80000) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r21}]]}}}]}, 0x4c}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000005000)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4f78695868891cbd}, 0xc, &(0x7f0000004fc0)={&(0x7f0000004ec0)=@ipv6_delroute={0xcc, 0x19, 0x100, 0x70bd26, 0x25dfdbff, {0xa, 0x20, 0x14, 0x2, 0xff, 0x0, 0x0, 0xb, 0x100}, [@RTA_EXPIRES={0x8, 0x17, 0xfffffff8}, @RTA_MULTIPATH={0xc, 0x9, {0x1, 0x7d, 0x7, r14}}, @RTA_ENCAP={0x84, 0x16, @generic="f6dad118e51e2800a0ddc48ba9c157a6f786295928a574d28da72d49766e9372f36ec821344d2babefb20460881f09b3b807f2c172ce4d7899cb909f26f996fc2d4fd6504398cd4845b774372802b6079419648cbc96f0df19f84247fad38f98228507f449e1c8b1d3deb1a97df0431957e822b36f512b8c2647dbf43a8646"}, @RTA_MARK={0x8, 0x10, 0xffffffff}, @RTA_OIF={0x8, 0x4, r18}, @RTA_OIF={0x8, 0x4, r21}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8c1ceb6fde2a97d6}, 0x8084) fcntl$setown(r3, 0x8, r9) semget$private(0x0, 0x207, 0x0) 07:55:46 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)) r3 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r4 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x100000001, 0x0) ioctl$IMCTRLREQ(r4, 0x80044945, &(0x7f00000000c0)={0x4009, 0x72e, 0x1, 0x8}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) dup2(r3, 0xffffffffffffffff) dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:46 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x74) [ 928.774363][T18476] XFS (loop3): Invalid device [.], error=-15 07:55:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x1c7) dup(0xffffffffffffffff) [ 928.906184][T18481] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 928.931170][T18476] XFS (loop3): Invalid device [.], error=-15 07:55:47 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7a) 07:55:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000000)=')-{$vboxnet1\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 929.122515][T18481] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) setresgid(0x0, 0x0, 0x0) 07:55:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, r0+30000000}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r2, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 929.233370][T18503] XFS (loop3): Invalid device [.], error=-15 07:55:47 executing program 0: semget$private(0x0, 0x207, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0xc7bc) 07:55:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x110b30, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r4, 0xffffffffffffffff) dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 929.367691][T18503] XFS (loop3): Invalid device [.], error=-15 07:55:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000000)=')-{$vboxnet1\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:47 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:47 executing program 0: semget$private(0x0, 0x207, 0x0) syz_read_part_table(0x13d, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000000)="b0ff70e0c75461da994a522708eedbc547ca40acc7c2caf6a2fcfcde8a91622f02739c3ca416b5c76ea87650a216e916904b35410ae0299c73e072b0e3d5a1b0b9e8637916519dc14be8082b4b8a08d956af1fa34e260539299322fbc518ae", 0x5f, 0xba}, {&(0x7f0000000080)="fba18217db4121c9d24b281327cfca0ded05326a47e69df9a9de9654e802134ecbc2dc71dfd7694498c5b4ad32b3b3bcc5dcc3b7149e503900857425fd64a066b17bddbd4ccdc5148aa434", 0x4b, 0x1ff}, {&(0x7f0000000100)="2ff6347cd059e83f48a3bad75b8f916f094c317d3c051cde25df89ae28e7dd224682c8f080fde25cab48bc7a487b32cf3621e0f37a10858e9134370de61200e51a31af98a1a0df8338755385c855ef", 0x4f, 0x7fffffff}, {&(0x7f0000000180)="65a2037e23a1ad56e42f18196da6b0f6ccceace4a549684865dd87c1797715e99562adbeecd0bb57d54fc3095abac24004a43ebce0bc78e263c8e4210006ab0d2c10c17ad0e9d230534011d3cff1b74e7611f105015b926c994a87c04c562165c54f7f5d3be6244d31c3d6138df74fbc3cb3dc8c19bb8db3201146cea381e2908fd004e79dcac3f6aae618c36d6da9bb5465c622f5c42cb9d6a54c46f47749b33881a3311b39530d68", 0xa9, 0x5}, {&(0x7f0000000240)="88b4bd1373466a5e869287a6d89fb96d98b780fe0eed3607bbf84dae3cb8e5f9be687fe7a6b767415c9117fd7ecbc2c079ec488bd71496c026591c11e0597bb976d2a0dfcfeda45e10e9f56b7f7284cfdab8513070e8110f8a58120a989abad7cd0ebbecdd45241df5377f9d7195fdc58b59039bc11a28cb934feac077dd88e3e3ed02c84e97762df528f597716c962d6813d4", 0x93}, {&(0x7f0000000300)="28942170e673618deb5bc42211db1f2e05599d0f9e7e1140079401fd391cfefb7a8a33e893c57c7a16ee06b136c7631ada675ec2385a9c65504f6c8b6c7189c1c2ffb706fbf8e12c924fd0a5f50f81b2bf6e738d10f8e1599eefb618c0f1d184a2abb80a00957a8bcc9ed39d512e4e8a63db6dc3f3306252c2ab19a6b1b145238c31856ef3a2", 0x86, 0xb0}, {&(0x7f00000003c0)="243de573f16518ad722445c3696e7be0acca1883f2f0bf241952f906b4d2e28deb6ea7b515679c58847d955ebe3dd3554465c5c567b1cc739490adc001581a5cbcd64f0fb578dfb757bce4d3bb686ba0bd28ff9a54f1a80e47d34c17f4ea5eed734364d0fc6b19181afae8db4f7d915ea5c1973851efcea2bc989cce391417970d228b3b0a194b15640b0efc7279f50a384873004d066b4dbd25addd6a469ffa85bdf30148d12827293903bfc1090b172624342221033dfedb22310ce56ed03a6de2c20562132709a3a66239a2d6495093858f602adb8709d35ea04b4885", 0xde, 0x2}]) 07:55:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e) 07:55:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r3, 0xffffffffffffffff) dup(0xffffffffffffffff) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 929.605787][T18528] XFS (loop3): Invalid device [.], error=-15 [ 929.693519][T18528] XFS (loop3): Invalid device [.], error=-15 07:55:47 executing program 0: semget$private(0x0, 0x0, 0x400) 07:55:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r5, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r5, 0x44, "f40bfa", "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"}}, 0x110) 07:55:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x2012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) semctl$SETALL(0x0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:47 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:48 executing program 0: semget$private(0x0, 0x207, 0x80) prctl$PR_GET_CHILD_SUBREAPER(0x25) 07:55:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0xad1fe1ab68e78c65) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) ioctl$KDDISABIO(r2, 0x4b37) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r4, 0x4) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r4, 0x4) ioctl$void(r5, 0x5451) dup(0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, &(0x7f0000000040)) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x7fff}, 0xe) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x6, 0x20, 0x3f, 0x0, 0x0, 0x125, 0x977b64610a1c797d, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x5, 0x7e6}, 0x8201, 0xffffffff, 0x7ff, 0x2, 0x6, 0x8, 0x7ff}, r3, 0xa, 0xffffffffffffffff, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r9) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000180)=0xffffffffffffff28) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) [ 929.966484][ T26] audit: type=1400 audit(1573458948.011:87): avc: denied { ioctl } for pid=18549 comm="syz-executor.2" path="socket:[233475]" dev="sockfs" ino=233475 ioctlcmd=0x5411 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 07:55:48 executing program 2: prctl$PR_GET_SECUREBITS(0x1b) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000000)=[0x101, 0x3, 0xffff]) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x40, 0x1) getsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f0000000180)=""/183, &(0x7f0000000080)=0xb7) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000240)={{0x94, 0x7}, 'port1\x00', 0x0, 0x0, 0x2, 0x2, 0x400, 0x1, 0x6, 0x0, 0x4, 0x5}) 07:55:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x300) [ 930.075774][T18557] XFS (loop3): Invalid device [.], error=-15 07:55:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000400)={0x2, 0x0, [{0x86a, 0x0, 0x3}, {0xb14, 0x0, 0x2c}]}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000000)={"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"}) [ 930.204194][T18557] XFS (loop3): Invalid device [.], error=-15 07:55:48 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r5, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r5, 0x44, "f40bfa", "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"}}, 0x110) 07:55:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f00000000c0)=""/50) setresgid(0x0, 0x0, 0x0) 07:55:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:48 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 930.389926][T18575] kvm [18573]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 930.478031][T18588] XFS (loop3): Invalid device [.], error=-15 [ 930.499669][T18575] kvm [18573]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:55:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, &(0x7f00000001c0)=0x3) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r3 = accept$alg(r1, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmsg(r4, &(0x7f00000002c0)={&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/4, 0x4}], 0x1}, 0x2000) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$TCSETAF(r7, 0x5408, &(0x7f0000000300)={0x9, 0x81, 0x8, 0xb05, 0x17, 0xff, 0x3f, 0x9, 0x1, 0x9}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000000)={0x0, {0x1ff, 0x1}}) dup(0xffffffffffffffff) 07:55:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x500) [ 930.590688][T18588] XFS (loop3): Invalid device [.], error=-15 07:55:48 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x18000, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = dup2(r1, r0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x200) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r3, 0xffffffffffffffff) dup(0xffffffffffffffff) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:48 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:48 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, r0+30000000}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r2, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:48 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x10000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000001c0)=0x8) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000200)) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xf6, 0x401, "de8e6e76dd47788bbf872d6695ab87b1fe31c340c67aa5b8c05d5533657947d370d278a93024e3d0f4f8a669b539cdfc94ae6274336e87e7a0a8a1f72d2c6b3d1eb5a9a5e2278bb364a235f907057e1b0dbe4158efecb8c4656f88699a958791c98d90c8e650d563071df5883122b7661cd3e26ce5b99485506f5eab88614957a2e83da6a3c847af97ffe709e9386db988ec4462bb2de37c601d0eb3bfbbf0fe4d47b1d098e93aa0e7b51638083fb1b532b045688e66eaf25ac614254d484620794260c13050a116e3586dce44cb74835b6add1cd1a96eab0a5e4cd94e2e02992257ce3ab07a349b347e58c55d95"}, &(0x7f0000000140), 0xd2605f4444f777e2) semget$private(0x0, 0x207, 0x0) [ 930.950355][T18616] XFS (loop3): Invalid device [.], error=-15 07:55:49 executing program 0: semget$private(0x0, 0x1, 0x100) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80100, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x1f, 0x4) 07:55:49 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0xc38b48ffb750034a) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f00000002c0)='btrfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000340)="ef3308787ec5ed7af07f1d3c8d1c8274a15a4a25e7288d63390a4de2296bded5", 0x20, 0x800000000000000}, {&(0x7f00000004c0)="c43b61856796d1cf0fdbcd5d857910920001eb3b9ba1c8514a3c1d3bb2dc34c483374d30a1d4968e7dd0c4be22d5a9f66f25172ad4fe6ee4554640200b091823f2dd79d7f1a6bb19a22b5aadf9a8813f9613c7c829d57daa3d0c372a209f616c1fdd455f756f13e8f2d8a51b5dfeb9cf1faf9e656e2fcdcb50bddb1a1d08eece003a15e5a8168124c5323d3f6321251b23e65fd70f626e2a8217467883b2bdaf9457f1aff95b506cabc65b7731627052b44d1bf79c4fb133f6afede6b8fc81adc8df466f0e3d17d1476139242f7e2a92836beede7848e7a615", 0xd9}, {&(0x7f0000000640)="d2d520211d7ed6aeace90854873a5683543f3f331928dbbecbf3d6a40e01c200ed3b52218406f8b06d92c3fd7078bd7790002c135be48dad7b9bec74114f5597f6e88222bad18258019f6aa33c050cf79b7f4cb48abb1614950528e7ea31aabc24efe037f4daa10e252320b30b22ecb7669ae3eeaa2d295e2f9e64e486a34f805a6c31ad47a15ab16410045bdbcd7142f08504521b78a7a4ae46828a9e653f0522ebaf49f4361e8923f848a7fc6afaf7887e3938ff97ac944a54d9209f92259637ffbcd24f53", 0xc6, 0x4}], 0x1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f00000000c0)) read$char_usb(0xffffffffffffffff, &(0x7f0000000140)=""/69, 0x45) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) r5 = socket$isdn(0x22, 0x3, 0x3) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000100)={0x0, 0x2, 0x6}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89a3, &(0x7f0000000280)={'gretap0\x00', @ifru_mtu=0x3}) r6 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x0, 0x1) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000c40)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x6c, &(0x7f0000000c80)={@broadcast, @remote, 0x0}, &(0x7f0000000cc0)=0xc) sendmmsg$inet(r7, &(0x7f0000002480)=[{{&(0x7f0000000740)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000780)="80868025c53a0c23a8ef9b6e5b554c4e9f2167b1a0b599f3f5268f3e67153a571b18ee3de2c80e20a16202988ea6dfdb4bb6449fdf74ffb0238fba270f44f0123a27acaf21b5945b99d7b761b24d4ca59c3cbf1f7984d4482f4880337af0bfa3741299256b09e876189c26d70e174f6d771a655d21165bef1de1bad5372891c147b8ba72345e5cee6c734cac0d421e553d9887d37ee2dd72e62b", 0x9a}, {&(0x7f0000000a80)="978e034810b06244d33d50a03999fc07a2fd149d08356f3b0fa2cd67257937873942b7b944cb3f569dc077d45f64348c5a79dfcd9a553200e0f62d4a5a8d5e13254ea9116513c50dc72634d9cfaff8cc7d64c0855fadc798a32bc1d8d3450cba99b04b1389749902e642f7a36bd9904ea5c2f0392c449a9f895b23254589dfe9e983b7200f2a847b708dff682c3a133234502d01d812304914010c4dd81e0cd4428bcec47100531d33b1fea92f4eb3577c83f729dde21ddb5bb508179e12c8247b6f5a1cd5c9cf1bc44596f7c8a888da0e393e499565f867d3c623617222bd9e53c2161bdfa74a9f9d5e8d", 0xeb}], 0x2, &(0x7f0000000d00)=[@ip_retopts={{0x98, 0x0, 0x7, {[@rr={0x7, 0x7, 0x2, [@rand_addr=0x6]}, @ra={0x94, 0x6, 0x3}, @cipso={0x86, 0x25, 0xffffffff, [{0x0, 0x9, "c86698d130b053"}, {0x0, 0x7, "598282c029"}, {0x5, 0xf, "f6eb86a82aae74393bc5344642"}]}, @ra={0x94, 0x6}, @timestamp={0x44, 0x34, 0x7, 0x1, 0x9, [{[@multicast1]}, {[@remote], 0x1}, {[@loopback], 0xfffffffb}, {[], 0x6}, {[], 0x1}, {[], 0x101}, {[], 0x8000}, {[@rand_addr=0x8], 0x200}]}, @timestamp={0x44, 0x8, 0x1, 0x1, 0x7, [{[], 0x2}]}, @lsrr={0x83, 0x13, 0x3f, [@rand_addr=0x8, @rand_addr=0x3, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x27}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast2, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @rand_addr=0xfe, @remote}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5, 0x3, 0x9, [{[], 0x3}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x120}}, {{0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000e40)="308b7b3456876641a28d243f58e022f7c80137174bb2a3a311714f45d94ab78abe7e07cf246fa443345a6e05e1742b8096076717949a202548660fd164e836af577d9b19651944def65a2d84424c897bd59746544ccb9a3eb8779ca27b861f6265c26051a47c74a27537f9502fc244a332b30ca4a28192f658a027ea1da60902da12b42067f79a3944ee42672d69681c5cc2824140a471e0f3ef4bf37fccb39cba709df7b16bb2f98bd0d9042442c2469f", 0xb1}, {&(0x7f0000000f00)="94b7a4e32477f2c601878a601d751bf1684bb9ec1df16584daa842df8a4d163d2cdd83d5bb5ce84980155507285038618ecc4a702be43ef33ea1f6be9f549947ce8cc0da80426cb8308712142b67f22f707132143a04b063d877617817d2aa1a93af0ae902cbe0c94ac2bc7225beecbec0756018dd4d37838c1ce426bfc2a1bfb292e071aa016b4e96dc8ae58c42b8071e4b3611d5848242ddd1", 0x9a}, {&(0x7f0000000fc0)="eb9989849f18d4ef99aad737fe05e8e585bd7fc068a3c9d6430c1a1aafa8ddf260876bc15b565532ae7d1849af7855ddfeee1965b4a4aa5c189ffc5cc0365f691aa81e6c797090a642d1e1290f9bd4a1d73b07cfc4c2383082e25e79df4c320568a840dc053b2702a1d357ae27eb1a2e1ecf9b4da125c254ee866e4b88f11016d5afd8786f5a56008446bcbbadf003557eb59ca2388ee752ea6ab4a9fe9c14a776d2556030da9753062a9e98a9e5b358224a3d248d35c9732a6e297475e04299250795608281eb3a764af3ad512ee86bf38d65e1cb17a4ba316c", 0xda}, {&(0x7f00000010c0)="4caf1d43d2b9ff3ed7381ed7d1b5714593dcf2e23336c4400d945c660d14b6fc56837d0bd49571cbee6a928809af254a83760f5620ef11eae0ba6113d903b759f5cdea1c9d0931630cb43b2589e565d13a675cfa30abda669f8bb0a1b35f8c74300f5d441682b386daed116ce904e592708edc04340d37b15866ebd4c6132eb28b716be72c87d26a027bb0cc255de59841b2f465ba4cbd50a8b15efcf10319f3cb1dce3ac2721cdf977d627cd9a415548acc", 0xb2}, {&(0x7f0000001180)="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", 0x1000}, {&(0x7f00000049c0)="e1ecf8e995f5b07d74a0c914ff444ea813ca445559c511ed386f0eda9dbcac796e4b1336c0df02142f3b216205a293121ba31531bd0a8f6c2de8190018d634980a54409657a94cacf1c78c95d6d8293ad1eb489a148a76f8e0afdb58125d5f5de09d23ea115054650da97cbfd64d9a9fdaa1fc693e404f5d5917c92dc2e47971676deb3890b78b22628cac127300ed65fe711f23b3040fedd7a24a2ea18b5fe91f3b60a9be2d6f23fdf5e615a77226b5fcc043d83c20b74cfa663f91ae031ea1a504804d1a17a9894bb71ae92f086d207a22a2a655dee5a9942bb7e9f2a127a6e0c8d02757dedc2cf94d289c789926060aac1c06d04735970c36e1f8a8a60d5666adb6ce54c02f4006c28676cef24e8073376762d7cd3f01d1a5955d6f181052af184d9c07db67828650ad15e51b8b400c246a94b455b6214c59d4380c9d689a41d953026f0450515721f54823fa61c18789b9a5e6d5116ca860f41eaa09d35c861cec06d6962f4c950ae15eb958c989e3d24d845a58db115460dbd52a1aca11152ec07a6fc27619858e0d7bd182dcc677277dd74b560b15f26101b752331ae2b1146f421521acfa5068b5d6b9af0acb3d037ed369876695e3ddd3db9db172cf0a2df9ef3cc629d92b136c3e5599bf269ea0417250d0c8a430adec549b0f1f5b1abdc367820246b5dd31e24c5c58319e9361dc67893fe8cf0d7694e763eb5d742713bd3bb07de8a30581603bed8597b086c2745e3dd5830c0131db99dd7795973042b6e0ac2d94ad7aaf4cd244b2d99658e3ad464768f396f2ddc3e43f3fef891e803181f7a940a69a5bc4dfa5ad60ae3dd6bf3d939c111e4bee1acc23dee443ae80734e9a9753860c7274f362f9b2e726cb7145cbe78367bca3e57f1b66d137d5f6080d635c6c0a4d75c3e177bd2ce6b42b607d85ff2ea3019e8e2551051ae71bb8bdd5809803fddd7ff6d88f7c6eeccdfaaf83cc8b198caa2cc1c833190deb6960ed9023beed733e5f9ca92937514c70079738308c2482f0f5412e22cf0a26938ad8d22adbf22b30dcbf5f5489741dcc39e1766b92f01e58285f83d8bb4150daf30b9a94f963e5c5f38b3b598aa05a356bebf95c67c9e20a44130f3f0b263cb4070f8e75e75ecec31c1b0aa14a9710b9d3e80cbe92d629d932993f746c59ba5e290b04242394ece31b7a3c7e6645f9363a8702c92d414cdc7c536d86b304c65cf3a413fdc3dc17e0d264e8bf725f577a15e24a1cda99252ca2d0e30b734b61ff73677921336a0ab869b9ca9ba6a6de5c3f8bbd631a7eb86421aed07ee0576ec0082ecf81d55086c5f7e7b11fb3c6a271d45da4ab9204ac5dd19da1e262d8f509ba008519fcd7af978c8b7a20fda3f0bdb6e547e8ffcf41d41a35c6c3f348677b318206fba7a5a910fe7012b1ff96824d1161242936f1e58c329311936f6b26313b7bf697178d40860dfe1933e2877f5358c67421fa8f46c398ce29edcc59ab882f5b27c08541f5f6768269a9fe31c4ddf67a5f5f3e8b8e7cb070b61ac0a6b1cd7c3b6b0e0547b35abb7ef597a50bed1c3a9095440df3a1627802dd27dcda6d0cf3763780b2d146ce3db740f21d638b89d152e2e981d0dd49bc6c42605409909931f58e77b08814d478751596e509a445acb9afe114ca5de77b4ef8098a30c45f8ec18267a3c019142801547ede8f95447f45c16b93f49c74dfc30b9004f67522e523f83cfe18111ed2c5009a944afec07a00cc6c9d6493527c0ba6e0f23478e7c6c349a4550a1cb698fcad84f0d9fc92dcae07062a4ba7489e23c217cbe7b13a0be6e1bc2c33ce65820a238d025b3920e1bf4881b1a4376d47d5323240cdf0e040e8ea320e6ecea66042f7603e19cab31f678cb4e40731ea37a5a538b324c44eb6c9a43b5269bb6b3b10c4408ede72ebaef3a6fdff249fdcba3f56b1d9f5e5e127d5248ea8f3b895eeb35c67c8360fd9f8edd29f4994db8ae14df74c195a1892995fc7c9475093f964c60e8cf765c263823db4214dda61466db7e981f0a068cd50b1ded27601ae7861b8cc5e4f8467ffe7918bb0a8f09d956796870883a5ec89e992438547aad46ed9c8837def5c718a042f3fd3d62344b4efb6d074e6f6497228f42100d6a71dfd0c46a74d87d191b872842763220e6e3e65697a8ddc5e9a04c0ac30dd56b0109e2f504375de6e598698b09174c1d8909f0323ec8666f765f42166d84559603cc3f8c2f62fd6318aa6c588d1e9024f43e8db2706eba9a595fb362662335a8d18305a4956a5ce3672d6b0daf2da2c37f5eefe4da333abb410ae67a48bbe8b3fabaddad372393858493ea89cf61f1defb6516417a129c174be3f3420ae58e03e8a510d4af6f57ddd380f0cf9bf0554d6cc44691be0cf33a9323f9eee4cb96801341dc5624f8e8dddbca35ee5f5ecc51863267b3edfa839bd905b761e113d81eebfda4ca888a56b0e2fbddbcb7bc45525f490db1c28d8877ff6a38093a7ef5beaf7bd29044db67d8b3bf52cd7d636ca338e984b0450317d4c301f79f5ebcb233b22973fb9e7591d71a3194a8218c3d1f225f0623be0486c53903ea991ec908dd3f7636403be81d065b7e0f4edd376aaecb3b8cf9ea3e9644e18516a0f2c27f31e06dce488abf6c5a63871a93e2c8d7e01d6b7531c61228d80717dbc92971e0dfa9c78f922dba58fe5d5f16db0263c63c2adf3830c06b30628388a2792ce058eeb9517935b78e0428b27dea6c1d492601228c1f6b282aa1a422ceed8b034116f104108542e5b6fada594e13345eb4cde08ddef5c1b13288473bee37882739edf7ead52dad8a6a8df4997884849be5ad15c79a02744f4a10084a0c81da294c314e81e5957e9a9203d4ae378e134b4f5cabd30657513863d57e6598ba60baa4d3778acf0511862a0b5e44b17b104a594bbc1d18a2dc7c26aff09fa8cac8d075f6ea661ffb9e6b9d0a4dede946ee864c2b3d287e6193578a47719d8e0d416edaa1ec7eabfff76eb2abaf5068ad592724f35615d6c455f1688555fabf91dda1b833d8fa0060897923f90e7070a2e4e0659f79e9a9f9ce5a8419cf4d9f75846f57f9d9f85a5b5793bdce491cffe12f87bd154d1d4703f9a472186d7865d0409f42e207842830b4c5851e08d18ddc9ca8b614964fe4055f7620724be54fc86be04778b89b6b8c2ce544b80ceb1667f6fa2908d96cf11697b01671c9d88cca9f7a19e995cae86ea1e39727f3894acc1dca8e999e02c887438b8dcc9708981662eee1df7ffdaf6c7c4a2131b1389b7709cf870659b9f282e30c19b5e4640c136c24227837a9b1d33b66d2d782ec6d55828515c8562373c1be2be40509a815e2816d8c0adab8fb1eb67ecf530b20f05b7ab4db8deac6035c350a76976ea158080c15d968b58f99d252db933f9f979f57c359dec7663800341e9e0ff932026b09b1ade932cef02fea35a6778a754d4cee42bbda06b505855445962a02bfde2390d3f1f6ff05baeb9f9ea900cc8be49309b31967330f63096a06c6ee5d2520ad56f61e9995be6ddf762319df2edfaafc2acacfb6739387c39c5c9825b74b958d9f94e74307c22ae636de15b44f2437c2e8d7d8a01b1c21ea4396dc854b4ac266c5df6ee17fadbe881b7d0a766825e51bcc7527acc25d5ee3612dbec2786d9f7023ae33ad7ee13ed7900d5d9a0e5f5cf890af41d1484fc1bc36227586db219f6e378eceb6645a4bb8e26c402fc8a33126292dc0ba27dde1104c471a443dc893db51061f885308a9db14d26f15d4ec202c685255519575ce32664e897b83df386258384950b93d76339e9fab984dd71b5959900dd9265b3d61c341bffde927f35a9e5d2d5db67560f57cb30831d953288b8cb808f55d14dc7f3180f72e66c73b8670ab7b5d402d0fd382e33acfecdd95c392375bae138f58579dd0b7339e7c7f10709a22b9807bfde32b201a666ec43b76bd17520c9025093edfdb503e21c79a1803881acaa7af3452af191bfa8e1cd89ef37e957377cf81c3e781ad7cc24d65ad77bcbc90655db8db10567276df537407771dc74c86ebe2557f5023df53e6dc17880ac93b770328206e19b99d7a546c6b8c021d68546722c30c7dea1cc6c14b5799080fa03a157d4d8c86684bf566640ad5209d15d20d0b2cbe20ec24fa38e843989c74dd893f37a16dcd21510e603c8de4dd5e01a6eca147f1ba83b0a1e5fd0ddab71c08b3ef565c18320112f91a184ec54328ab388c88bd3a77399fa08abb2087929171aaecaeaed20d1426cdfe569349da7a42b3782d33e210e32401ff38af7530209e7d03af429d445841a8ebc95d533c64297e85f14228b15a1d164cf7dc5abf1e41025b00a8cd88ec2cba166a93db2cef4dca1aa8ae696607792faeca2f8512182b31e5af07e70150cc4c6d39906837633033ed115537a87c29b264e1039c5e60cf1ea1c22923951473039ba9c4ef50aae45798fd7bc74a9f04e84cbb324afae38d0612ff3e4006f45232abdd17dcc0a4c1fd88f8ee6b4b48e0a994e687a918de0c0710e4ab3a1bbafa74573178f2da7dbd1d5afb7dc3e343fc82adde741cb393b26bf2a593a431ea4c63e31c162bab7133d694ff929322763edb8cf57954e4cb7bb3e257ad9fa98d1e8bc0a71372ecf426f7791f14fd5b889805f650aecb832b337039bbcbd39db9210b2d48823f831956e9ba6562845d4241699c3657ba808a1aaedf8b7df520f323703ec8749463a47b65deca3229c4b742e3f59cdb3f468a3f7ac9ee3b819435f446c5725c66e0c02baa9a4d3ce8ae34ff38bb7dba2a9ae0f3bc21d04c75420eeafdfdebae2aee5b00e417e0920483d3363a9da3bd4d0a1b52838bfb9c94e3452d11b0ebbea0d07e6b5c97d6e6cfed73b69f985944c499510a2fb6540944ddb228342d9c5da5706554e7e96663fb6deb0ed1407eb983bc15f4b0358b59878d80ce40ef095a862a1be8199eb5a2019e5ea10daf4ab52e3b4bab5953e28c290b7e7ba53f97ca99e20aad88cf1f15ce8bce875774143fbfe7ba8d662f1a7cd21ebc97083284458c1994d2201171ad76575e5b16f82b23495b8bcd3630067d9485604b5b81eb0baad33bc297279cc5e53ec093ae2b6f401735d55f58148d9c4f4dfb75414a88e6a5b9893db7a80dd04c64c837e38f74f79c977f3d2f59ecda8130efddeb0218d0e69eb45f79bd73f8fddf6f2527e5da466d493f6d5be4b0be1ae0a08d4c95218eea3c57d57d3c2a65029c5c64dbdbe060c0b90ba040fbafbde810a9c013d938c18c27d994f7310b9bb1c107749d253138ac163f73f6aa129a091fd0ee9a8b056e1a2e906d8dbda142942682691b0c11545579a7220b18dd05a8f5f0815cdac71775d30d492442424dc761ec28008bc740e377fe11ce7d6a5921898632ee88ed071a3d94c7d8519cee60260b3f44d6b690f91fcc00c4c5a525ef60a3b23e231e56ceba8f625235d2a9a01ac44bd840fb3ff0765effb4fec52c6f724d4c64554ee22d1b5cccd877298af7d7e5f16ba1f94479d0ed09676363d16df595c3553c01a47aa5ee68e784bc6127d372497a1169c35170a9633f052b6929f102df53e06a7eaa11c4a54c1626ea72c2339482e97060d5646bc2af5b67bc093890a33a4e38575180d4a64a8e38886c1d1fe28b8193535c6d1b85b6d77d80ddb0abf57288c36c270717239be74c171ddc461b7c4e385268258123f9894a4625d943a429f6bac224c3d503b9d1ff9ce32cac9029b62f8ba0d6ed2d0f885b972b799a2055acd96cb148ccd60b24d165b70c9857835d327", 0x1000}, {&(0x7f00000059c0)="254fd53bb246be0f45c2e5e213cbb1507e59f8a67b6c43e01a16178e83c821a65e8c644b1fba51e96698b701b9511fb23e7bec40493b82e0994b07894fed9e798b2fbf2e40ba9a46eee23efe7756e1ea30d1ae900ea38bc40accb805f5af0066324a8ee0250f6982edddb652d14a69d43409acbcb10a7ea84b0fac33081a48f611cb9d9b276386e3784df0bc0161a6e92136aad3bb410c1608432af35c4eed0ce04002768b9c94bfafaf4a45289f210cc95332ac07b604cd5d3db5ccf20b5567463185c9556f7be6992b0addd128eb00afe6023ee4cd2824e2f801a678b8b306425ff599fe7bd9cfcc0695277abb37a6bd46e0b240d5822fe274586e58582e0ccc3801dceea7597fb32d298cb4c9f539db002aea65f4afe5a0f584fa286a66237030e7c8010acb4bf6e8c28805e1f9f539a2b1892896d914696f552b10f0d100ce255291d262d3e60e81dad8faf3c7eaf711498d15421a4e3b3b4ea70e0953a1f77d2c01ee04aec7e8edfd9d72e058f68c55a7b87b26bbae3f72ec6951d8b058cf84f6ff83a82e536f90639a56d9d014c4983d354ba4e1e5f9326d85049e707680976de8ea9a9b694c5b04453a06acd39a598bc88909d4b95751c5e77b3faab83fbaa6e93fa6c631c39c435cb793279fbb0894f3708193b42ec7c211ea276ea82ba59d7dfe7757335786db861b91c5fe6beb427d1fbf4cd8f88420cb5d418df0012abeb9bf1ce041860a018f30c9c9a1458aacc24dcb6cba377811aeb2372108797395ce4cc289e9274060311d74a8b65e0e4fe09733d5944d914bba43124fcbc532286afbdf2f7b19c43debf6257d9e60817368ed432b595f445502e42df5ec3acc4cfbd4d3526011201e6273bf5ad2fbef23a76d31e5c8ddff7b81669387b683f0a1c773cd0f2247f673a6bb718beed4bbc4403a0589c79f7719b387f4525c4383c77defe5ebd0c83830e5dce589a1482e287b8c765fa5360461f9f53a6ddf1e2939b0d8f38bc1960da39632e413dfc1ec7757f3bd4f114070cf4b77ff8a386a58a4bb57f6640b021e84c472911190dfd57858bf0b8e5f76827937d4099da63e6d62ce1ab37ffc8742ca486a7e4d574434d7c56fc4e93d7f3bd7f39a863010d3ca540232c9b106e64155e2d69e38d1ef7bb2799c74e76ce128e6d9e9d07aeb1553a74d5b7002a19be2b9c6767bb90c11a6e4693f7e0f12f072329543253149d7625d611046c3de8788d00acbd967d0ed64b6b1f084b8f255951a46cdd9e2cb02e2b824b2397ddbb19f8880625f88c159347ac95d4de179929c2283978c725914264d97a20eec97497a4f14a64edf496d8c11dcc00a34260c16e03eee2f87811e7430177f3a3d479234a1d3da4d31fa35c6e2b5d793a2cb338377f56fe23de263b8ebfa002111bfa2a40a262548144fd1a88eef6039db5e3d6fa48863e20791284cbe62f35a75dabb7ac7b43e81dd38ffc936ebd8ee6dd74d4c29458714378d11eb1d166c36f5add9c3988f87c126ec1867bec483c57ee0cda853400a454763768cf9b1f1f3a73ff2bdaf026aaecee6d758d1c60da848fb26bbad1607036cbb37cf5fa4851fc0951df101635f0dc676d48424ab2c7c01fa5698368341ede2e044833303747a6de033b6c637bb758f41d952c34f5887ceca6dfd5acc93b22b4ef3829f75a98dc9fa3ecf8818a8142bd3db878f3adbcd674bdc9e7c33419b3b1916ba88e6b0126a45472b7953fe49018370411b9d4965031a470db608666104b5ebd68d5682e7b6e9c2a72a3266fad1129e27f8260089e9b036bc57921b78a457d299257dd54c09a4976e54806eec844fc050c74ad85200abdf1c73bcefac61fb62397a0edf63b003e4f1e35c2a9bf3f879894211d4bb48361da90f0f8e12fa9045bd2315bbe8d181ff526cc5d11cd52639eee4b9bc7f531ec16cf5840b08540c533926ec7a8da5cf3df0031895555ab1ef0f95cf686f5d3fd0f5e59ce9901d994128865674de82e73cac7b0d217abed15cf6fccf785ce64f09198faf083661a495819f1fbf5b2969ad26c3d0474cbf3cf4d7ebdef4b89fb96c7165cc3dda5e033539e89f819eacefd4aca8480da96c297ecd6b786a6805bfda6172462ce11404652966ced7c640b4bacf8e1967ef225eea65a0eba363604985e42bc1bfd954e539ebbf9a34ec21332a86d0fde1fac211e4e476e6880a7315bb78ad43aff66da2c3f0684784159a92e081ef4d0a21a696c144ee51a2812fe4865be7523e687d57b065834233e57aeada28d03458a261cc39d3ad844e97470ef0a3dbcfa8d8aefe72f750d814325a0e9889213405e84154d68924ffdbe764f31c67368b2ccce26c9c0d2601055e1c360368846d5e0f7c360100ec0a1cf3bf50908fec865268de355e56a7eec31f9bd90db81cfa5ed71c38fd6747adc808564f255b3ccad4b407f60c547c70feb44dbdaa6ed4c4d90351328759e4151b839903870b2fea35f089b0adb1d1e0f3d8493876a1992dbcbc22ee562979be56a591aeb2159b22cb923d16e089db49796c5d9f180dfcd4d6eaac2f6cc8269a679c38fdd1a6b912991d14d8cb6cca26f8f24fba4134cbab8cb179dee4df8eb1ad8730e1a0968956af0ed6926c4f9b7038596af18cb18e4e4c0f7a1c7ea98b83cb1d96b1a731baebacfcfa34655f5082d0583bdf7d45234abc2c286e4f3a42292a14dd392a0c4510e067e4a38d509704628beb49e4ffc3612620c55cf5de1efabc4e9439df1278137f59a0c1f42416a8f3ed74bea3fc55bda2288f1723430f646e163e5d45023c2703b3e36f712453c23b6dd893402973d1202e65f706a223e4df5bf41eb2900abd54f79d925a0eb059f49e6ad5af03185165f4c2e6a7a981493cd92752520551a1631d61b76ff648391a7f0f3ed475e6e36e8acf31edcb68cf011926ca107dda3aae35eee1685567a839148b0caa7aefc7bb064792a637e5348ffeb22a1bb37af88da1b6df084aae6578ee3cebb12faff045d26dc1f70c3b3fd399a2efd6b7734e27a0f4b3073e43c070ed50c037772f9ce66e0edf18db45d88c436ef6572a88d3402aceec5fb782c73fc4a7bdba195a503187fda6e87ba23a85927072a5cc5102caa47776c1792152e037396f61b047d0b6e125d994a1a8653f3bfc64617eccfd965026010f741b2496c824d6e66636420f4407baf996232eaa9f60f4fb77b4a09e029b01042ca32942fb92f78736fd68cdd12d9e934719cd4cb3effb659b896bba432a203d4e984469d8b2350a6e00af787f565e1eb7a4104170cf34991040ba977681dc85693c67844fd6d138e442b33e0068753b4d6b832bd2171317da6424b745b6f4447717d80cd83728cbb5e036b5af8f0c088109040b099cee004d517a8382e84d4ad256b4ab3138bafdd28b4a39d3d0617c2ed8ab5da8ea2167f08ac9bafa47d94ce2023ecbdcfeaf2a23d61585b908b3cced68304f70a64753446f0a5e081969f583ebdb93ef83fc23341a9e1144c0f61f4dfdec6f76e8e0a01c9bf3cdb0168b38e52379bd7a1a79aa84c8882abebf753c519e463874024fe32c7716a9f4e8940b919a86ba95e945f4bed8dbc1635f90df23266077d735720a004a7dc16d9321c3a9ef0dbac07292f8ba592b94495a4d644db3065aa735f837479503625cefc7827279df7d19040f5e0de260e8fc6e877ea94e1cc3786e886142a297aadb93c384eba6602296a8c616302bc919792c5e9ec5c054b2342a892e1c5644541667fe0250ba23831a477064e631c00552b4d619b3a258cdd2fb4938d70d3a7f27b439b7e3d612bfe9b4959b56b845cf018dee113117913c7e061a63a41c63b63b9810fd7a53e01e8c5b57770334b5dcccc9107631c3bf7535df5ab39682413f06f8c734620d6ddabf371f58d0b98262db902e677ebeb0bd2c7171a4335808b2f9ab1f2dbf19dd0bdf31bd693d7ca89ea69ad10faecb20182a088e1146c1a27f38da210a00760798b046962251d1005ee74728c36c0e2e48b725d310c4b8ef7cbb4b6ac27f7149cf7f7e1c5e6e89a5486917e85ea5a0247fdd0eff8612ad816383fe73b322d391185570f6bf5faa6f69d87a260a9eb8f21411910d62a09be60c449a69ad3609292c646935f72fcccfc3aa7485b5a661fb94524fe181a4a0c837862f3a40561a26a7a4a3332d7b8b4b3ae79def86226701e4d6fccc6f007b6f8b86f6d165290a236a73a7d2cf44dbd1134547a092077e5ee9ba7a5ca5c87eb837c41914e3cce66ef0aef0dd2d3fe0bb15106874f60d0d6b16c5e19f10e299737caab5dc1169bc898dbbdb9b957b48ddc2bbac770c95ef684db1278501d847dbb1b7108f55fb895e0f9c262bc22be4d3e73f2ff96e07ede57d8091e7b3bd459eb17472800de7e5cca96331cf58d94de2ae3c3088bb60c5a9bdd1ce6149d585339931fe2279f92b5aba682302be5fee6ee5c214dd97da834a684dc77bf609dc6cddfcfa3ecffaab73b286a389c8bbcc302f6791feb6603d64d0625ca07d8d332e2cb372f6f72f86de159962adee640489c5a50dade38e72dd9e162c0575d0123626cdaa22db2c8289988d9d13fc9bca95e9b7e49496267dbc5795fdd5ef26882fe77a444af14c2b0279312bdf43d689830aec9a33c78524b441ebf729b53a7a60e3c9491f58cc1fcd54cb5a7df5c82869740a98c60e29fbf80793d53f40b1dfff185acca9f160760df4a9099e89368e24a77bc786c118bbff94eff6dac2446d24d9e007645c7c75c7a5b5a0e9b76c40a87941a3dafecb97a3f81ad4d603b1e200db595b5e47d43ed088ef8f379fc67e23da33020ed044194485c2f6344980026da7bfe31fde0de11bfbaee4eaccc7093b532424bdaade29f42bd85ab44e80ab48eb7bd1547e28a90ce44e7fbb0f07337b98439bd09c985305bc2499e9c09ce6670dc318c0d0b61f8a330f0cec6420407b0fa1f4b5c0941e969b299affb49881d7d9842091cba04fa921c1caf404bbf54cda5b00f9f15248bf55c813ac83e49ec0093926da89e2abcc58e41f25a44085b54780b9d041c0ce04a35197c97e7138b3ef6bdbfdef184c656cae65a5831c82f2455ffa5fb170bf60c86f05ae6607eec6e8c190ab53a787abad84cc231aa20082344155fd7169e78c8c8754b0cc51dfbc522e1db544ba55245fd4b66a524b8ea4bc88d068f4363d8b82af759010e6a130daeac3580a5aa329e0abedb8602e53eaadd7b95227ccf35f9c8d9597a81265bab0c6a431a490aad3575ca8b28d9b6259851c038db443d166deb3b0c891943acdad976514cac8f30d6ddf275849ae0bcb2922a1af9b530188d7fa8a02f5408d1d780adfc4af6c08d11d3eb362ba80c8b03e6b82d7f10804200b7d62488237ea21ff4c52f72877305e58b7750111876d646616e70a69fcc04ae285e995f5b776ac83f2a295fdc44a6692406594644807226ad3ff72246cd4a4fa698454cb0c4c6a6d89aaecabdc723892f34e4884f08af9b283f55830775bc897a4ae815e9503e34c7e61aeca91373c57e7044a79f4ba54c7eaf42cde3fb35db83413f71b314ba6fe8932c2c86a4431348b4efec69f0b49aca2718570c5593718d786affdce522ccab53b15cf9c9499143d764d04e8badffc53a1a2fd3c34a3ed2c32ab636f9c3eb2e07a4a62f2145a566deb4f8f10b71501b0a53659e40c78cf631470d84b1bb38b0d4180bd7d6ffd36bce557caff7be1419cc88aa2d96033a977f301e366c9b32c10bf01ff9b15e96f8b39714fb6b383659b1def907c7ced82f1a1369ef7ef7b277fd7b8", 0x1000}, {&(0x7f0000002180)="f35aef714db63533864d77a863291c5be5902c40192ce51fe0a68b65cb127416f666c55e8910c15926c66d839b3ef49bc700a5a0d12d23b09333d95e7e3adc44b3acb6c952c2e34a4a63064fa36e9896da8eefb083bbb2a8a9bfa2e8e4442ba51f0c1eda97139e249106f9e8e33287cb0ca03a3ab405b465f30b3c4dc42cf77006bce5fba052", 0x86}, {&(0x7f0000002240)="6e20b2ad7fb728212069ee439ee4a40c0d1a09e55d52619377a49684f7f21358c683486e819f7e970acbfefb36304091ffc508af90fc0ded23bd1c749e2b36c98a4460694cb0dc0c8acb548d6930ba2ba8e6ce6d1b4dacb78f522a809d45bf4ecf2f9d7445d102f39c1f53ca058a83611acab0e8b7838ae9cda949eae4a9c3189ec92e720cc211", 0x87}], 0x9, &(0x7f00000023c0)=[@ip_retopts={{0x58, 0x0, 0x7, {[@rr={0x7, 0x13, 0x40, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @lsrr={0x83, 0x7, 0x9, [@local]}, @rr={0x7, 0x1b, 0x68, [@local, @multicast1, @multicast1, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @local]}, @ssrr={0x89, 0x13, 0x8, [@multicast1, @dev={0xac, 0x14, 0x14, 0x14}, @rand_addr=0x4, @dev={0xac, 0x14, 0x14, 0x29}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x88}}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r6, 0x40505331, &(0x7f0000000880)={{0x73, 0x6}, {0x73, 0xa7}, 0x1, 0x1, 0x6}) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000001c0)=0x10, 0x4) [ 931.021077][T18616] XFS (loop3): Invalid device [.], error=-15 07:55:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x600) 07:55:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x47, &(0x7f0000000080)=""/71}) r1 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x7cb5, 0x448102) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000440)={&(0x7f0000ffb000/0x2000)=nil, 0x0, 0x5, 0x1, &(0x7f0000ff8000/0x4000)=nil, 0x200}) bind$bt_l2cap(r2, &(0x7f0000000000), 0x199) setresgid(0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="3406bf9bbbec97d2f01685db86941a6c0af7713097ace2cd82b7e03a1fa97a6fed6951dd31aab125efbc0ce434fde24dc43b2315657cb9ca60fd55684792b509427698921c5e4f1a7bb95b238f9ef0603422319766ce4dbe07ab700df9456bd3db0d1697ea8bafedc08776220ea0f3a6ea", 0x71, 0xfffffffffffffffc) keyctl$search(0xa, r3, &(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, r4) 07:55:49 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0x4, 0xffffffffffffffff, 0x1) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}, 0x101}], 0x3, 0x100, 0x0) write$selinux_attr(r2, &(0x7f0000000000)='u:object_r:app_data_file:s0:c512,c768\x00', 0x26) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0xfffffed1) r7 = dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x63, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) 07:55:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000001c0)='selinux/mime_type\x00', &(0x7f0000000200)='/dev/nbd#\x00', &(0x7f0000000240)='\x00'], &(0x7f0000000300)=[&(0x7f00000002c0)='\x00']) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 931.401073][T18642] XFS (loop3): Invalid device [.], error=-15 [ 931.520847][T18642] XFS (loop3): Invalid device [.], error=-15 07:55:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x700) 07:55:49 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0)=0xffffffff, &(0x7f0000000180)=0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) renameat(r4, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') dup(0xffffffffffffffff) 07:55:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) semtimedop(r0, &(0x7f0000000000), 0x0, &(0x7f0000000040)={0x77359400}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:49 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xc0', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:49 executing program 0: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000100)={0x5bf1, 0x3, 'client0\x00', 0x4, "4905173edb88a18a", "2d7564e7553a7f7c15332ee3648079e6dc17f6393e6806ad27f0b20e8e50aac7", 0x1, 0x7}) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="9f40a15ebacc1ce2ac31bf1cef1eb7010c256c51358381d4fca85ea18ed532c2a8eafb00a326a3fb3f27a85bcbb5c643a370e2170830966cd9fc69bf702d36835a2e93e7274d20262bd0971f74c0417c3547603fcb8d53b78a9897b77c5ab9ad0d353463b9c34282ff4310e14aa1e9bfd0ec73deb744aed71bcf19be9a0286189dad0ff99b47fc0a32b44edf7bc87875c5675d888850a8f998e82d22e2aa54be619d67cbc34f", 0xa6, 0x6}], 0x20c14, &(0x7f0000000340)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@errors_continue='errors=continue'}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x4e24, @multicast1}}) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x143000, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000080)) semget$private(0x0, 0x1, 0x109) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x10, 0x803, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000540)='limits\x00\x80\xa8\xdb\x02\xffC\xd2p\xa5W\x14\xa2\xc0+\xfc \x84YN\xff\x1a\x7f\x85\xf1\xa7(q|\xe3\xed8\x15\x18,?\x06\x86\xc9\x80\x86\x1b\xa8\xc4J\xcb\x7f`\xa3\xf2\xb5\x03l\xc1~cK8\xf3\xe1;JG\xed\x0f\xb3\x95\xb2\x14z{d\x1d\xff\xc5\xcd\xe0\xae\xd6\xbdS-\xc0\x90m\xa0\rq]K\xe3\xff\xff\xe1Q\xeb7V\xfe\x17\xef9.5\xafc\t\x13\xde\xc7\x8e\xebn_Q\xeb*w\xa7\x9e\x8ab\xdcS\xf0\xd4\xcb\x06`v\xc8\x01\xac`AqDS%S\xaf\x98\xb0\x02{\\\x9f1%\xf0\xf0\xd2a\x91\f\x153\xad{\f2\x90`bz\x14\x901R\xdd\x11\xd7\xc9\x10\x85\a\xd7\xf0|\xccW&\xe9\x81Eu\xa2db\xd6JJ$\xe1_fH') preadv(r9, &(0x7f00000017c0), 0x3a8, 0x0) r10 = socket$inet6(0xa, 0x3, 0x6) r11 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r10, r11, &(0x7f0000000240)=0x202, 0x4000000000dc) r12 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r11, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="44d9195b2745c9eb1a8a8192ae8cd6a46f93b3a564755b8e99229322", @ANYRES16=r12, @ANYBLOB="050c3700000071b3166100000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r11, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x68, r12, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x200}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9055}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0xe4df4eaa7adeda4b) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x82220000}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x8c, r12, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8}, {0x8, 0x1, r13}, {0x8}, {0x8}, {0x8, 0x1, r16}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}]}, 0x8c}, 0x1, 0x0, 0x0, 0x3}, 0x1) r17 = syz_open_procfs(0x0, &(0x7f0000000540)='limits\x00\x80\xa8\xdb\x02\xffC\xd2p\xa5W\x14\xa2\xc0+\xfc \x84YN\xff\x1a\x7f\x85\xf1\xa7(q|\xe3\xed8\x15\x18,?\x06\x86\xc9\x80\x86\x1b\xa8\xc4J\xcb\x7f`\xa3\xf2\xb5\x03l\xc1~cK8\xf3\xe1;JG\xed\x0f\xb3\x95\xb2\x14z{d\x1d\xff\xc5\xcd\xe0\xae\xd6\xbdS-\xc0\x90m\xa0\rq]K\xe3\xff\xff\xe1Q\xeb7V\xfe\x17\xef9.5\xafc\t\x13\xde\xc7\x8e\xebn_Q\xeb*w\xa7\x9e\x8ab\xdcS\xf0\xd4\xcb\x06`v\xc8\x01\xac`AqDS%S\xaf\x98\xb0\x02{\\\x9f1%\xf0\xf0\xd2a\x91\f\x153\xad{\f2\x90`bz\x14\x901R\xdd\x11\xd7\xc9\x10\x85\a\xd7\xf0|\xccW&\xe9\x81Eu\xa2db\xd6JJ$\xe1_fH') preadv(r17, &(0x7f00000017c0), 0x3a8, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x60, r12, 0x324, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r17}, {0x8, 0x1, r8}, {0x8, 0x1, r7}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x60}, 0x1, 0x0, 0x0, 0x8}, 0x40) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4210002}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x7c, r12, 0x10, 0x70bd29, 0x6, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x31a}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7f}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9bf}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x28060805) 07:55:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x6, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8002, 0x0) r0 = socket(0x4, 0x3, 0x9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="beec24c89e1a3d93cdf091be07a490e6c052f1db07a6034ea63f7e7189475cd0b82d4d690227379eaa96a1e319498c45ea42ee0177656f016435e1aca8fa02524ba2154833ca24ec88cf22fb698a7b5b3f29c4724ed0b81b73e1ba3014b7", 0x18) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x15e, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x1, 0x293, 0x39}, &(0x7f0000000240)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}}, 0x10) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1f, 0x100) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e22, @broadcast}, 0x10) setresgid(0x0, 0x0, 0x0) 07:55:50 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1f}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:50 executing program 4 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xa00) 07:55:50 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:50 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB="66642716bf4259c72234ff63973002923107c16c37d6a1b500db29e6b3bf2b944f6ba1cade5173d31cbf8d401f098267a830835dd0fa194a9d5cf9c771", @ANYRESHEX, @ANYBLOB=',rootmode=0000000@00000000004000', @ANYRESDEC=r1]) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r3) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000000c0)={{0x6, r1, r3, 0xffffffffffffffff, r4, 0x4, 0x4}, 0xd3c1, 0xfffffffffffeffff, 0x2}) 07:55:50 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000080)={{0x0, 0x0, @reserved="00ddc2afd4997f9374a898d622ffae1ea3094fbde991fdcb3f551e5c991ad70a"}}) setresgid(0x0, 0x0, 0x0) [ 932.443782][T18701] XFS (loop3): Invalid device [.], error=-15 [ 932.507939][T18701] XFS (loop3): Invalid device [.], error=-15 07:55:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002600)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r1, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000002640)='/dev/audio\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000002680)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000004bc0)='/selinux/mls\x00', 0x0, 0x0) bind$alg(r4, &(0x7f0000004c00)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) r5 = dup(r3) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000004b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004ac0)=[{&(0x7f00000026c0)=""/218}, {&(0x7f00000027c0)=""/243}, {&(0x7f00000028c0)=""/141}, {&(0x7f00000049c0)=""/230}, {&(0x7f0000002980)=""/27}], 0x0, &(0x7f0000000400)=""/166, 0x228}, 0x4}, {{0x0, 0x0, &(0x7f0000000840), 0x4}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}], 0x3, 0x20, 0x0) getsockname$packet(r5, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000025c0)=0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r6, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/161, 0xa6}}, {{0x0, 0xd9, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xfffffffffffffd71}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}, 0x3}], 0x3, 0x2000, 0x0) r7 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) recvmsg(r7, &(0x7f0000002540)={&(0x7f0000000040)=@ax25={{0x3, @rose}, [@remote, @netrom, @remote, @bcast, @default, @netrom, @rose, @null]}, 0x80, &(0x7f0000002480)=[{&(0x7f0000000180)=""/195, 0xc3}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/170, 0xaa}, {&(0x7f0000001340)=""/158, 0x9e}, {&(0x7f0000001400)=""/90, 0x5a}, {&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x7, &(0x7f0000002500)=""/11, 0xb}, 0x40004020) r8 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r8, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:50 executing program 0: 07:55:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2000) 07:55:50 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:50 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') write$UHID_CREATE(r2, &(0x7f0000000180)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000080)=""/123, 0x7b, 0x401, 0xdb, 0x9, 0x5, 0x4}, 0x120) 07:55:50 executing program 0: ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000000)) semget$private(0x0, 0x207, 0x0) [ 932.829013][T18725] XFS (loop3): Invalid device [.], error=-15 07:55:51 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = getpid() keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=@encrypted_new={'new ', 'default', 0x20, 'user:', '\xadselinuxvmnet0&.wlan1GPL/[', 0x20, 0x5}, 0x41, 0xfffffffffffffff9) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x0, &(0x7f0000000180)=""/145) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x7, 0x0, 0x0, 0xfd, 0x0, 0x2}}, 0xe) setresgid(0x0, 0x0, 0x0) [ 932.977743][T18725] XFS (loop3): Invalid device [.], error=-15 07:55:51 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/21, 0x15}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000)=0x401, 0x4) semget$private(0x0, 0x207, 0x0) 07:55:51 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f0000000080)="5af38391a85d11217ad3de4c2c6c641bee53d6989818b4f9e63162139f83333d56ecfcef2dde") r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000180)=""/134) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x40) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r8, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r8, 0x9}}, 0x10) r9 = dup(r3) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, &(0x7f0000000040)) connect$l2tp(r9, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r10, {0x2, 0x4e23, @multicast1}, 0x1, 0x2, 0x4, 0x2}}, 0x2e) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x3, 0x4) dup(0xffffffffffffffff) 07:55:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4000) 07:55:51 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r4) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000240)={'ip_vti0\x00', 0x6, 0x5}) r5 = dup(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/k\fm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r10, &(0x7f00000001c0)={r1, r12, 0x4}) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r14 = socket$rds(0x15, 0x5, 0x0) getsockopt$SO_BINDTODEVICE(r14, 0x1, 0x19, &(0x7f0000000080), 0x10) bind$bt_l2cap(r13, &(0x7f0000000000), 0xe) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000340)={0x7, 0xe5, "76efc3dcf798d48ddd146d94a1f89e22662865dee2ee3e4c731ff3907782b1abc1d8bc7313207459f23b07f9ae8899c367224107971f4363bd86fa7897beaec01e6df2a5f56fd429bb879829e33b4e1119362308fcdc6456eab83e30e66f0e52aa2a13903d34efb8f17baf5271a0a4bb4d913d524e199fa8be0c71ecf9bf38d177029cd23bc2edfea066cac2f46ae33c85c8d4f568ee4ca99d674b61f493e4b994844097644c01f21c27224e459d2178ab171d9a75b7d537d6e5e931bb0efc8d4b9122a55a5db7986be116f7323871087860ab5d78282a54f10adcfffacf7f4da83175c2ce"}) setresgid(0x0, 0x0, 0x0) [ 933.267548][T18751] XFS (loop3): Invalid device [.], error=-15 07:55:51 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)=0x3) semget$private(0x0, 0x3, 0x18) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xd9a7, 0x800) [ 933.345196][T18760] QAT: Invalid ioctl [ 933.392308][T18751] XFS (loop3): Invalid device [.], error=-15 [ 933.419637][T18766] QAT: Invalid ioctl 07:55:51 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:51 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) io_uring_setup(0x65d, &(0x7f0000000240)={0x0, 0x0, 0x8, 0x2, 0xa1}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000080)=0xc) r3 = getegid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r6) setresgid(r3, r6, r4) [ 933.466304][T18765] kvm [18764]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:55:51 executing program 0: llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/111, 0x6f) semget$private(0x0, 0x207, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)=0x6a6) bind(r0, &(0x7f00000000c0)=@llc={0x1a, 0x200, 0x0, 0x7, 0x7, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80) 07:55:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200000000200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = semget$private(0x0, 0x0, 0xa015c40f79551ae0) semop(r1, &(0x7f0000000000)=[{0x2cb974f50b7b8ce7, 0x20, 0xc00}, {0x4, 0x2, 0x1000}], 0x2) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 933.583996][T18765] kvm [18764]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:55:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4800) 07:55:51 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x10004000000002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffe7b, 0x0, &(0x7f00000000c0), 0x1ec, 0x8126000, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xd7, 0x60040) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) setresuid(r5, 0xee01, r6) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000040)={0x3, 0x70, 0x81, 0x1, 0x0, 0x5, 0x0, 0x1, 0x100, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x6, @perf_config_ext={0x9, 0x9}, 0x2, 0x3, 0xc2ba, 0x6, 0x4, 0x1, 0x5}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) mq_notify(r4, &(0x7f0000000280)={0x0, 0x15, 0x4, @tid=r7}) [ 933.764323][T18785] XFS (loop3): Invalid device [.], error=-15 07:55:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfc, 0x0, 0x2, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0xffffffffffffff00, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0xcad1557717ac8390) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 933.870228][T18785] XFS (loop3): Invalid device [.], error=-15 07:55:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x100) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="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", 0xfb}, {&(0x7f0000000500)="10f19dfd5f4b1db842ffc73915765529f29eddc33cf82b6ac766cd4ed6f57fb1ee8a696afb1dcb4bd9e741bd11b1d648189bf3a7e936df1006bff7bfce463da14deae2995bac7cbbad97ee93353c5a80dc34d5bc4a8d83df14b4d8f3ee3827018f93c4a0a8d5209caf95fa0bc81eefe8b304b3b80cf985a3925b2fb967cf4ad945d40ca96caf00a3", 0x1eb}, {&(0x7f0000000480)="9499dd4f1b6c62adbf4d9629774ed3f52550d33a4fcd77ae5f8f712f45a9e46ae4ee3bf3dde12ceaae3c89c3f46455caaf0289f620a42e7b9cb0666ae52ad8e9c97e66f1ee3fed5a29b736ebb9bc64d36187454254ee40153a7e2c584209263d283836e358", 0x65}, {&(0x7f00000003c0)="de0db6320803f3a50d3899c1f5b13159e3029a288589a120479dd38665713c14e819f2e58d990ce7c160dae4fcca1b705913a4b51eb6a5b307259360e1806c752c871c1bee6c388c043996f0eebc03087dd34440b4c1a673c02a921f813c14a031bab02956673806a063cf48837c9a277152f806473e4f4ee8ac7caae0f7cae7598910df588c82d0cf221bdd3c5b779a416716612e10013a6dcb275fa5a87bed658c30b0cdd2d601c71f8c83edb7ae492ee5c9ebaa", 0xb5}], 0x4) setresgid(0x0, 0x0, 0x0) [ 933.968542][ T26] audit: type=1400 audit(1573458952.011:88): avc: denied { set_context_mgr } for pid=18798 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 933.977259][T18802] Unknown ioctl 46851 [ 934.008757][T18801] binder: 18798:18801 ioctl c0306201 20000240 returned -11 07:55:52 executing program 4: perf_event_open(&(0x7f0000000100)={0xf, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffffd, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c00e300", @ANYRES16=r4, @ANYBLOB="03000000000000000000010000000800040002000000"], 0x1c}}, 0x0) r5 = shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r4, 0x101}, 0x14}}, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x48, r4, 0x408, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4044000) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x2400, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f00000002c0)="fe5d3e575a300d9ed6ea2828d526ececad2d14b702bffdf19d62d8a101d0ec69a099e64c2d59ac3cb4e35eaea225acb1b51ccbf97ebe7dc09b550287f6017e1d4922decffce9dd0a737287abc4becd02298de837efb499aaa6b5c2d6cab0a8ff0fe01175be3cd32176848e0659fb0803d903ff7f0000531be967c81dc4db1389b6bf", 0x82) dup(0xffffffffffffffff) chdir(&(0x7f0000000280)='./file0\x00') write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 934.044741][T18805] Unknown ioctl 46851 07:55:52 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:52 executing program 0: lookup_dcookie(0x0, &(0x7f0000000000), 0x0) semget$private(0x0, 0x1, 0x40) 07:55:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000000c0), 0x8) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 934.214993][T18814] XFS (loop3): Invalid device [.], error=-15 07:55:52 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000040)=0x9) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) bind$inet6(r1, &(0x7f0000009080)={0xa, 0x4e22, 0x2, @local, 0x7f}, 0x1c) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000093c0)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000009200)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/58, 0x3a}], 0x1, &(0x7f0000000880)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000000280)=@tipc=@name, 0x80, &(0x7f0000004b40)=[{&(0x7f0000000300)=""/231, 0xe7}, {&(0x7f00000004c0)=""/165, 0xa5}, {&(0x7f0000000640)=""/178, 0xb2}, {&(0x7f0000000700)=""/171, 0xab}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/155, 0x9b}, {&(0x7f00000001c0)=""/5, 0x5}, {&(0x7f00000049c0)=""/180, 0xb4}, {&(0x7f0000004a80)=""/152, 0x98}], 0x9, &(0x7f0000004c00)=""/207, 0xcf}, 0x6}, {{&(0x7f0000000580)=@nfc, 0x80, &(0x7f00000007c0)=[{&(0x7f0000004d00)=""/172, 0xac}], 0x1}, 0x800000}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f00000064c0)=[{&(0x7f0000004dc0)=""/211, 0xd3}, {&(0x7f0000004ec0)=""/130, 0x82}, {&(0x7f0000004f80)=""/199, 0xc7}, {&(0x7f0000005080)=""/245, 0xf5}, {&(0x7f0000005180)=""/4096, 0x1000}, {&(0x7f0000006180)=""/169, 0xa9}, {&(0x7f0000006240)=""/242, 0xf2}, {&(0x7f0000006340)=""/105, 0x69}, {&(0x7f00000063c0)=""/235, 0xeb}], 0x9, &(0x7f0000006580)=""/201, 0xc9}, 0x401}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000006680)=""/253, 0xfd}], 0x1, &(0x7f0000006780)=""/80, 0x50}, 0x8}, {{&(0x7f0000006800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000008bc0)=[{&(0x7f0000006880)=""/4096, 0x1000}, {&(0x7f0000007880)=""/4096, 0x1000}, {&(0x7f0000008880)=""/239, 0xef}, {&(0x7f0000008980)=""/145, 0x91}, {&(0x7f0000008a40)=""/230, 0xe6}, {&(0x7f0000008b40)=""/119, 0x77}], 0x6, &(0x7f0000008c40)=""/99, 0x63}, 0x4}, {{&(0x7f0000008cc0)=@l2, 0x80, &(0x7f0000009180)=[{&(0x7f0000008d40)=""/219, 0xdb}, {&(0x7f0000008e40)=""/119, 0x77}, {&(0x7f0000008ec0)=""/132, 0x84}, {&(0x7f0000008f80)=""/201, 0xc9}, {&(0x7f0000009080)}, {&(0x7f00000090c0)=""/180, 0xb4}], 0x6}, 0x10000}], 0x7, 0x2, &(0x7f0000009400)={r3, r4+30000000}) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$EVIOCSABS0(r8, 0x401845c0, &(0x7f0000000080)={0x6, 0x6, 0x9b1a, 0x3, 0x5, 0xb9}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x181601, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000040)=""/39, &(0x7f0000000080)=0x27) semget$private(0x0, 0x207, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000200)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x5, &(0x7f0000000140)=[{0x4, 0x5, 0x1, 0x3}, {0x4, 0x4, 0x80, 0x1ff}, {0x1, 0x9, 0x0, 0x8}, {0x4, 0x3, 0x7, 0x6}, {0x3ff, 0x6, 0x6, 0x7}]}, 0x10) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x8001) 07:55:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4c00) [ 934.306397][ T26] audit: type=1400 audit(1573458952.351:89): avc: denied { name_bind } for pid=18818 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 07:55:52 executing program 1: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 934.380179][T18814] XFS (loop3): Invalid device [.], error=-15 [ 934.461589][ T26] audit: type=1400 audit(1573458952.351:90): avc: denied { node_bind } for pid=18818 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 07:55:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:52 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 934.593150][ T26] audit: type=1804 audit(1573458952.491:91): pid=18819 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir350517682/syzkaller.80hRTh/1828/bus" dev="sda1" ino=16829 res=1 07:55:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/lev\xdd\xcaY\xe6#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'lapb0\x00', @broadcast}) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getdents64(r4, &(0x7f0000000180)=""/229, 0xe5) dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 07:55:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) [ 934.762382][T18845] XFS (loop3): Invalid device [.], error=-15 07:55:52 executing program 0: semget$private(0x0, 0x207, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88002000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x8, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24018008}, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x10001, 0x2, 0x200000040000080], [0xc1]}) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self\x00', 0x10004, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) openat$selinux_context(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/context\x00', 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self\x00', 0x800, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fstat(r3, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000001c0)={0x4, 0x0, 0x6, 0x0, 0xd}) [ 934.829493][T18845] XFS (loop3): Invalid device [.], error=-15 07:55:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x8000, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(ctr(cast5),sha224-ssse3)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r4, 0xffffffffffffffff) dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x60ff) 07:55:53 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 935.177854][T18873] XFS (loop3): Invalid device [.], error=-15 07:55:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r0 = dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f00000000c0)={0x1, 0x1f}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000280)=ANY=[@ANYRES32=r6, @ANYBLOB="ff000000020050b9997c787b6821e212c58d95382a3f4a9fba48d67145a5af52e2671631f49d0cec17b51ad851a9f9844040c9f0987bfaf89b35602cc0dedb4191e62aae9c575424fdd8026764f56fca82b061deb034c4830eab09949a1c1eecc9aba9a06c095722fcd7ed20f6f16fbb757cc2128c3bb0f5cf4fdb747b72ec06d8000000000000000000005449ca69d9f117d467374076699d8e22586269cb9ffe6d805d6c07f9bdfd90973335b5702d3fb9e4e8727b192d"]) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f0000000040)) connect$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x5, {0x40, 0x7, 0x2, 0x20, 0x6, 0x1}, 0x1, 0x1}, 0xe) 07:55:53 executing program 0: readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/196, 0xc4) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@initdev, @in=@initdev}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) semget$private(0x0, 0x207, 0x0) 07:55:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) accept4$llc(r2, &(0x7f0000000080), &(0x7f00000001c0)=0x10, 0x800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r3 = semget$private(0x0, 0x207, 0x400) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f00000000c0)='k6\x17~0\xb7\x04\x00', &(0x7f0000000180)={'\xdb\x04\x00', 0x0}, 0x0, 0x0, r5) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r6) keyctl$instantiate_iov(0x14, r6, 0x0, 0x2d0, r4) keyctl$describe(0x6, r4, &(0x7f0000000040)=""/56, 0x38) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:53 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0x9) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 935.285957][T18873] XFS (loop3): Invalid device [.], error=-15 07:55:53 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:53 executing program 0: semget$private(0x0, 0x207, 0x729) 07:55:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6800) [ 935.623775][T18900] XFS (loop3): Invalid device [.], error=-15 07:55:53 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000880)={{0x2, 0x3, 0x1, 0x10001, 'syz1\x00'}, 0x1, [0x40, 0x8001, 0x8000, 0x8001, 0x1, 0x56c, 0x8, 0x20, 0x0, 0x53, 0x7, 0x6, 0x5, 0x1ff, 0x2, 0x40, 0x4524, 0x7, 0x8, 0x7, 0x6, 0x55, 0x5, 0x100, 0x9, 0x1, 0x3, 0x7, 0xbf6, 0xfff, 0x5, 0x7, 0x154d, 0x80000000, 0x6, 0xfff, 0x80000000, 0x4d3, 0x316b, 0xfffffffffffffffd, 0x22, 0x0, 0x9, 0x800, 0x1ff, 0x9, 0x0, 0x9, 0x5, 0x100000000, 0x7ff, 0x6, 0x5, 0x6, 0x1c1600000000000, 0x19dd89d7, 0x10000, 0x5, 0x3, 0xfffffffffffffff7, 0x3c, 0x7, 0x6, 0xfffffffffffffff9, 0x7ff, 0x0, 0x400, 0x5, 0x401, 0x7fffffff, 0x8, 0xff, 0x7, 0x8, 0x150, 0x20, 0xa98, 0x4, 0x2, 0x800, 0x3a2, 0x3, 0x9b38, 0x4, 0x307, 0xd23, 0x2, 0x100000001, 0xc9, 0x5, 0x7, 0x5, 0x8000, 0x419a3aad, 0x2, 0x9216, 0x81, 0x1, 0x8001, 0x40, 0x9, 0x200, 0x1ff, 0x6, 0x9, 0x7, 0x20, 0x8, 0x66d377e4, 0x9, 0x0, 0x3, 0x65, 0xfffffffffffffff8, 0x6c, 0x4, 0xb5f, 0x100000000, 0x9, 0x4, 0x101, 0x0, 0x8, 0x8, 0x6, 0x9, 0x2, 0x7], {r5, r6+10000000}}) r7 = dup(r3) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r4, 0xc06855c8, &(0x7f0000000280)={0x3, 0x57, {0x57, 0x6e6, 0x8001, {0x8, 0x9}, {0x8, 0x215f}, @cond=[{0xa4f, 0xcd, 0xfa7c, 0x3}, {0xfff, 0x3, 0x7, 0x9, 0x10, 0x1}]}, {0x54, 0x1, 0x101, {0x400, 0x80}, {0x1, 0x8}, @rumble={0x3008, 0x1}}}) ioctl$DRM_IOCTL_UNLOCK(r7, 0x4008642b, &(0x7f0000000040)={0x0, 0x19}) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) dup(0xffffffffffffffff) 07:55:53 executing program 0: semget$private(0x0, 0x207, 0xde7b246e232d2afc) [ 935.714583][T18900] XFS (loop3): Invalid device [.], error=-15 07:55:53 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000180)="281464cf7cf8759ce598aab63d639e45c94d92c949df8ddbd94d5b8106a1a527b335bb131d514d5ab86c8cd36c8755e57e0fcf8dcc81282dbed1b6ead88aafaa7f9b0e8b0c8767d359611d14ef9d64975595f475b55ccce6e978020d430a54e5c670e19766d96fa8fb8fb4a218fc8cf9ecd10bd11b8344800446ad593f34dcede269face7bbc3d93e580a90598c7a1c72004a0e869e7b70da9eb3dbfa1317e4ffab3190208d7b97697ed83873fac8cdad8aaf6c88e711ea6a0", &(0x7f0000000240)=""/191}, 0x20) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 935.773168][T18916] Unknown ioctl -993503982 [ 935.802097][T18916] Unknown ioctl -1066904120 07:55:53 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 935.847429][T18916] Unknown ioctl -993503982 [ 935.877546][T18919] Unknown ioctl -1066904120 07:55:54 executing program 0: semget$private(0x0, 0x207, 0x418) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4281, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000040)={0x1, 0x7, [0x2, 0x6, 0x8, 0xabf9, 0x3f], 0x6}) 07:55:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffa4daaa53, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="eaeb3321b7a653be2e1794f7aa8d1a20428a3e1f67052314d1369b4345bde730d2330bf61a06a79b8a522d1ce7ae78828fbac340bbd78724c8cd49c2560daa50fe7765626431d422a4ef5ec9ffa43a3bc3e9f9bd764ed5390fc622bc7a06e69289591b096098e7d850fb0613a1896ee3fa2195a6cfa2e9f64c47407425263404965f1ff8268ba7b192d0505bba1fc669f5434bfbadcc781a9ddf8e7926163ef16a95f62619", 0xa5, 0x40}, {&(0x7f0000000080)="e3414b39", 0x4, 0x7fff}, {&(0x7f00000005c0)="14d31755", 0x4, 0x80000000}, {&(0x7f0000000240)="bdabd376b8caa079a880501d32530dfc4b8cf49f999c2de9aa6b46d9ffe146a21ea4fc044c7713e4a896d4d702abc06f6d9f1a0a299bef5d3155f2c56d6f363842b090605fd871681099a43cb1a33cea36b90cc282a7025f3363021319942e064e470bf0b2128af2ec3208666f4c23f76cf3a451a888c5c240d02b3fab0ebe65f79f18b4a94eae0b3f5531b59d665f91355afc7e5a9909c58efb1a19394d9afe8004021044b89d1c4e89da7ee965744f035957d2c034d8b9154d762d8e3bb95f6390aa386113b3635628c2083f", 0xcd, 0x40}, {&(0x7f0000000340)="4202aacb668722696d34dc0dd08ac0f58d7674667cda1d92479645b740c614aa439097ea98bb8162a9c3525de6675faebea1d734af61e31ea13250d7ebe8910ac3329a71e0f587ab5ed9a044a054d42e3f30cd5819dcedf1221c5fa7974f03c4bb1ec6c5f2ae9bbd6721d553e91783640312237d30c220f9cb9e4b471ac5a46580b4dc9dcd512892a69c50e3210cb01d8fa925bb208006663c7fcb63af3a7b6e06950298c5ee0abc4ac8e0f5d6afd3a900c1b4d8204d034a5d310645fccb9eaaf399f67277e95bf0258da8c952a70b74ba4b50cd1b821f5c626c341c4747ce2be86f505980f4849000fea231763f8138b76873d88d32051560822c", 0xfb, 0x9}], 0x10000, &(0x7f00000004c0)=ANY=[@ANYBLOB="73686f775f7379735f66696c65733d6e6f2c756d61736b3d3030303030303030306572726f72733d636f6e74695d75652c636173655f73656e7369746976653d6e6f2c756d61736b3d30303030303030300000303030303030303230303030312c6572726f72733d7265636f7665722c646d61000000000000000067bd2fd8e715b730303030303030305030303030303030303037373737372c736d61636b6673685f757365723d5b766d6e6574306e6f6465766367726f80ffffff00"/198]) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:55:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6c00) [ 936.001535][T18935] XFS (loop3): Invalid device [.], error=-15 07:55:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x5, 0x3f, 0x0, 0x2, 0x0, 0x3cc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(morus640-generic,sha384-ssse3)\x00'}, 0xbf5ee17739f70b8f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r4, 0xffffffffffffffff) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x482, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r5, 0x65, 0x4, &(0x7f00000000c0), &(0x7f0000000180)=0x4) dup(0xffffffffffffffff) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 936.098298][T18935] XFS (loop3): Invalid device [.], error=-15 07:55:54 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0xfffffffffffffc8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff7, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000, 0x0) getpeername$ax25(r1, &(0x7f0000000080)={{}, [@rose, @default, @netrom, @remote, @bcast, @null, @bcast, @null]}, &(0x7f0000000180)=0x48) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='/dev/snapshot\x00', 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={r3, 0x57, 0x9}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'sha256\x00'}}, &(0x7f0000000340)="60c5c0c8cf82465e7ee8b544ffa08a21ed9bfed184cd7d8d43e5da3d5ec54d14fa0f78b06f55bf3330aad5010b457581ca10b579fda4510e75b577bc4bb948cfca9793779219edb6efbb1ecc585b8262449a4949ae2940", &(0x7f00000003c0)=""/9) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:54 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2, 0x18, 0xbf, 0x8, 0x9, 0x0, 0x70bd2a, 0x25dfdbfe, [@sadb_sa={0x2, 0x1, 0x4d6, 0x9, 0x4, 0x32, 0x0, 0x1}, @sadb_x_filter={0x5, 0x1a, @in6=@mcast2, @in6=@ipv4={[], [], @multicast1}, 0xa, 0x2c, 0x10}]}, 0x48}}, 0x40008e0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x94, &(0x7f0000000040)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}, @in6={0xa, 0x4e21, 0xa535, @rand_addr="bfcd52679ec850afabc32da0a59bd2c4", 0x1}, @in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0xb}, 0x40000000}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e22, @rand_addr=0x6}, @in6={0xa, 0x4e22, 0x80000000, @local, 0x7fffffff}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x10}, 0x1f}}}, &(0x7f0000000240)=0x84) semget$private(0x0, 0x207, 0x0) 07:55:54 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x4, 0x401, 0x7}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, &(0x7f0000000000)={0x4, "b7d7dd7110c1587082ace237353eacd773697a14f46ddcf8b823b11f6c5b3a15", 0x2, 0x1}) 07:55:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000180)={0x0, "fff88ae063dea6bf44173cff19e08bb02e36950d46e82671db42ac59ef735ad3", 0x0, 0x1, 0x3, 0x2, 0x0, 0x1, 0x7, 0xfff}) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:54 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0xfffffffffffffffe}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8a88e8324140f40d) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) get_robust_list(r5, &(0x7f0000000340)=&(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)}}, &(0x7f00000003c0)=0x18) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x4be, 0x8, 0x257ec0, 0x1, 0x9, r4}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80), 0x36e, 0x10100, 0x0) ioctl$IOC_PR_CLEAR(r8, 0x401070cd, &(0x7f00000004c0)={0x7493}) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x8000, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r9, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r9, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7100) [ 936.448591][T18962] XFS (loop3): Invalid device [.], error=-15 [ 936.534579][T18962] XFS (loop3): Invalid device [.], error=-15 07:55:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$alg(r3, &(0x7f00000004c0)=""/243, 0xf3) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000280)="188f9ce7b95c5420ed170c57a4fab49c2148a0e8cb95ee284a567f3df6863281d5fed16c555a0ee1ed17fa035815b4edff40771c66141695e475aac9dacac78297359b7840243e1cb47900be1ddca7c1b7db036683cf85f02002b36de0822d0e3a459883ef97dded793b9421a9e7ade60032d7e97602385511747271ca991d3130552a2adf7ef164d1490b0c6ba7cd390969d8a1a9eab3fc8cb5bdd0f681f1b245ec9ad822e1cf5961ec4459f9bed27096004d99ec62", 0xb6, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r5) keyctl$instantiate(0xc, r4, &(0x7f0000000340)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'trusted:', 'skcipher\x00'}, 0x22, r5) r6 = openat$cgroup_ro(r2, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) accept4$netrom(r6, &(0x7f0000000040)={{0x3, @null}, [@remote, @rose, @bcast, @rose, @netrom, @bcast, @remote, @rose]}, &(0x7f00000000c0)=0x48, 0x0) semget$private(0x0, 0x0, 0x94a07a4ac9b20ac9) 07:55:54 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:55 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) r5 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0xa85519d38e1d3889) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa0, r6, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb3b}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x65}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4008851}, 0x80) setresgid(0x0, 0x0, 0x0) 07:55:55 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000080)={0x892f, "e617fc6b12fdbafa6c757f96f9076c281c1f678f80c5538e075903cea7e481aa", 0x200, 0xd97, 0x8001, 0x10, 0x2}) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) ioctl$KVM_NMI(r5, 0xae9a) recvmmsg(r5, &(0x7f0000009d80), 0xf9, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r5, &(0x7f0000000300)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) r6 = getegid() r7 = socket$alg(0x26, 0x5, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_netdev_private(r4, 0x89f1, &(0x7f0000000340)="8017564cc0b8cab0fb90b6e9852c19fbe21c3c2b4993335d3622d7c07a0879a495d8008fb3f8839bd91b48d0ecf70875a4f6f71ee987ec7b68b82d633b090556fa10b740c69a309a") getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r8) setresgid(0x0, r8, r6) 07:55:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7400) [ 937.006200][T18989] XFS (loop3): Invalid device [.], error=-15 07:55:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8, 0x4}, 0xc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) recvmsg(r5, &(0x7f0000001580)={&(0x7f0000001180)=@tipc=@id, 0x80, &(0x7f0000001500)=[{&(0x7f0000001200)=""/251, 0xfb}, {&(0x7f0000001300)=""/247, 0xf7}, {&(0x7f0000001400)=""/127, 0x7f}, {&(0x7f0000001480)=""/72, 0x48}], 0x4, &(0x7f0000001540)=""/10, 0xa}, 0x1) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000040)={r4, 0x101}) semctl$SEM_STAT(0x0, 0x3, 0x12, &(0x7f0000000180)=""/4096) dup(0xffffffffffffffff) [ 937.115986][T18989] XFS (loop3): Invalid device [.], error=-15 07:55:55 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:55 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xca8, 0x1f, 0xffff, 0x2, 0x10001}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="a9000000b80e76e11f15386c312ca57f5b35b22db2145ec23cbc8a9b129b1f2adc669549df3b352b5719d9880d7f4fb5dbbbbe44e5e7b92818019b1e37aa9cd27ced1b4a1c05ab3da108051bd2574ce0be0ee0147e0a459bdac49b46caabc781c73e14ce2e65e42e8c4d5701c0c9082215e425580763740b21dc940ead01ccc5fdcbd793094bc38ab3db32bfea0c23f3021f6a81c00933596ff5f6b1876e68cb89d520c3f093ef7f6353"], &(0x7f0000000240)=0xb1) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r3, &(0x7f00000002c0)={0x1f, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x82, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r4, 0x40505330, &(0x7f0000000300)={{0x8, 0x66}, {0x3, 0x81}, 0xffff, 0x1, 0x5}) setresgid(0x0, 0x0, 0x0) 07:55:55 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x344100, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000180)={0x0, 0xe2, &(0x7f0000000080)={&(0x7f0000005800)={0x58, r4, 0x121, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x3d6}}}]}}]}, 0x58}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r7}]]}}}]}, 0x4c}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r10}]]}}}]}, 0x4c}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r13}]]}}}]}, 0x4c}}, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r16}]]}}}]}, 0x4c}}, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r19}]]}}}]}, 0x4c}}, 0x0) getpeername$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000800)={'team0\x00', 0x0}) r22 = socket$alg(0x26, 0x5, 0x0) bind$alg(r22, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r22, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r23 = accept$alg(r22, 0x0, 0x0) r24 = dup(r23) write$UHID_DESTROY(r24, &(0x7f0000000080), 0xfff2) recvmmsg(r24, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_mreqn(r24, 0x0, 0x23, &(0x7f0000001a00)={@local, @initdev, 0x0}, &(0x7f0000001a40)=0xc) accept4$packet(r0, &(0x7f0000001a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001ac0)=0x14, 0x0) r27 = socket$alg(0x26, 0x5, 0x0) bind$alg(r27, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r27, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r28 = accept$alg(r27, 0x0, 0x0) r29 = dup(r28) write$UHID_DESTROY(r29, &(0x7f0000000080), 0xfff2) recvmmsg(r28, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/233, 0xe9}, {&(0x7f00000004c0)=""/189, 0xbd}, {&(0x7f0000000580)=""/88, 0x58}, {&(0x7f0000000640)=""/138, 0x8a}], 0x4, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x83, 0x0}}], 0x3, 0x0, 0x0) getsockname$packet(r29, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) r31 = socket$alg(0x26, 0x5, 0x0) bind$alg(r31, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r31, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r32 = accept$alg(r31, 0x0, 0x0) r33 = dup(r32) write$UHID_DESTROY(r33, &(0x7f0000000080), 0xfff2) recvmmsg(r33, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001cc0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001d00)={@rand_addr, @multicast1, 0x0}, &(0x7f0000001d40)=0xc) r36 = socket$alg(0x26, 0x5, 0x0) bind$alg(r36, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r36, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r37 = accept$alg(r36, 0x0, 0x0) r38 = dup(r37) write$UHID_DESTROY(r38, &(0x7f0000000080), 0xfff2) recvmmsg(r38, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r38, 0x29, 0x22, &(0x7f0000001d80)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001e80)=0xe8) r40 = socket$netlink(0x10, 0x3, 0x0) r41 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r41, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r41, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r40, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r42}]]}}}]}, 0x4c}}, 0x0) getsockname$packet(r0, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f40)=0x14) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000001f80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002000)=""/253, 0xfd}, {&(0x7f0000002100)=""/148, 0x94}, {&(0x7f00000021c0)=""/88, 0x58}, {&(0x7f0000002240)=""/25, 0x19}, {&(0x7f0000002280)=""/176, 0xb0}, {&(0x7f0000002340)=""/241, 0xf1}, {&(0x7f0000002440)=""/67, 0x43}, {&(0x7f00000024c0)=""/183, 0xb7}], 0x8, &(0x7f0000002600)=""/22, 0x16}, 0x20) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000002680)={@dev, 0x0}, &(0x7f00000026c0)=0x14) r46 = socket$netlink(0x10, 0x3, 0x0) r47 = socket(0x10, 0x803, 0x0) getsockname$packet(r47, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r46, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r48}]]}}}]}, 0x4c}}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002740)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc000}, 0xc, &(0x7f0000002700)={&(0x7f00000049c0)={0x5ec, r4, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r7}, {0x12c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xc85}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x12c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8, 0x1, r25}, {0xf8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0xfffffffffffffcee, 0x4, 0xb21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffff000}}, {0x8, 0x6, r34}}}]}}, {{0x8, 0x1, r35}, {0xfc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r39}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r42}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r43}}}]}}, {{0x8, 0x1, r44}, {0x164, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r45}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x87c}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r48}}}]}}]}, 0x5ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x4020800) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r49 = accept$alg(r1, 0x0, 0x0) r50 = dup(r49) write$UHID_DESTROY(r50, &(0x7f0000000080), 0xfff2) recvmmsg(r50, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x34d}, {&(0x7f00000029c0)=""/4074, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x400000000000244, 0x0, 0x0) ioctl$VT_GETSTATE(r50, 0x5603, &(0x7f0000000100)={0x800, 0x6, 0xb8a}) socket$inet6(0xa, 0x5, 0x8d) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0xbd9fbc3873e2136e) 07:55:55 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x426f937266b38e04, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0xfffffffffffffffe, 0xffffffffffffffcf) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000180)={0x1}) [ 937.357513][T19017] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 07:55:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7600) [ 937.408325][T19017] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 937.474739][T19025] XFS (loop3): Invalid device [.], error=-15 [ 937.490271][T19017] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:55 executing program 2: prctl$PR_SET_FPEMU(0xa, 0xf6473aaa012bf586) perf_event_open(&(0x7f0000000100)={0x2, 0x3b98cf806aaba5ca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x515}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x200) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 937.530601][T19017] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 937.559274][T19025] XFS (loop3): Invalid device [.], error=-15 07:55:55 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) sendmsg$sock(r1, &(0x7f0000001980)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x2, 0x4, 0x204, {0xa, 0x4e20, 0x0, @empty, 0x2}}}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001a80)="46f707c7accc25c8f1d117539b6d5c9294b377b79074a0", 0x17}, {&(0x7f0000000340)="9cf92ba1ca8170c7cb81b01d0f46cda61cebd1e496671c402ee00b7d23f8ea295da700f3eb1bba43568149963fe997602564c82563222c7dcb7417922f6631b15638d57b4c7a821ac49539eb5284dbb39a102ce16ac3301cb80927030f6116cb693d1c82edefad6e19dc72ce6950ce857cde21f2631c954d59990fdc7d4f4a37c12da1b9cf4c422aaade14e3d61b7a2e4defb91833bbbd960ae6a72780c9289a2b33e60e2e40c1cac49c7921c35ff9fa346b6000947f281a102ecb", 0xbb}, {&(0x7f0000000400)="1321b306b7533a39cc224e68df1ca04ab06a630f50565df832745a18c752efa21eacc5643cb7283d5c07e6de4c30adf978bfbb3781ffcc53a94efed4a44b0b528e0ef5cfc7bfea8e4e", 0x49}, {&(0x7f0000000480)="abc3e2f920b1ada38c0e67330ccb085772f553aa41357a0ecaa7357578026dc0067bd89693cc292e4e91c04df9f1979708ff4eb8f35386ff9a0638b289978a01b9139a5996a13d3f0c6efc2e14d4ae41cd62779371f4", 0x56}, {&(0x7f0000000500)="21f67b085e9e3d1bf53dddee5d9bca18c62e0986e5fe75c07337bc9b2cb6a217935805fa6570f53229f0366fbd0fce501004cde5cd6140a1d872eb8c89240fcb93d098553c51cf0c98a5578b88ab390009311a94be22ae9845397e39a36a0159eaff9cb1de8a592c5085e15f5b2b63ef5ebc408aa74ba218822dc12cdcc454980c7bf499c7c0c272786a25cb17332cd197c2c9aa9598b182", 0x98}, {&(0x7f00000005c0)="62d81a491ebae7c6d2562b76b7dddc618cebc3454f39d51911abea7af759b776e84840e24a3ec6aad17f5761c755dee46ec2c1674307558ac5353a194e2f0a91204ceb9bc46ba90644e5f52b3bddb755292b9121bf926e35ac60781fd347db2014339a68e0d7ef6cf5df555f5fdda945398edfbd8d2e8813bb373faaba3fee28064b049bbe04e1e94cdc67480cff5ccf1cc0917fc87bb58483c5da8887629022e7c5f5e54a9d8b86e7a9629a2bf45c4e9e269a50f1365600b50e4679d31cfabb23f5c5c8bceef8", 0xc7}, {&(0x7f00000006c0)="9b947d02950804b6828bf4bc0794e90b789a35aa9fd0192188cd1cbeabff6b35866086ee9ea7f07acc7e6dccc8388ba4ae67eaf34192bff64b193affd784946e3212d3453279c197437a4ab23910e1e284f6a0e527ef8340f27a998973a13b5f1cc99697a468e04c579139a836f91f2b981fb4b7f7fc903327fd1f6b45b292ac138749fb288250dc836c9b91be535443ba9a76472f45641efa58e1aa20bdfe95b724e2b641fbd1c2d62676480a", 0xad}, {&(0x7f0000000780)="36c754b287ea7bb49ca964c2a3011528f8452592d681f43079532d7e51dbdae4736f475bb84f22a2c02c85012d3f1b0dc7939c21bc27c32504025446cb9f5b95eb30fda387cd438acf3272e7b15f5f534b626e10f9e819bebfde8eebf77ec487235b08b5be3035bb599a1e4cc201fa5a00aac425e10f8d29efd9dd218b90cdcd752738f8da2a31148a97113e641e75dc73bb008f4acd1a6b304b226b1a6b42b61dcb570dc46c1c2b999c65494eebee6b3bb04726c7864aaea3e1d956c9fd4887022c4cc359d144a5a1ef9db59ccfc0dfee0a971edcc214c45ff894e135ef472a5d9659c9c38b5b6a25a227835791a980ba717753a8bb3127644992b6c332", 0xfe}, {&(0x7f0000001ac0)="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", 0x10}, {&(0x7f00000008c0)="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", 0xffffffffffffff02}], 0xa}, 0x50) r3 = dup(0xffffffffffffffff) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101880, 0x0) listen(r4, 0x3fe) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f00000019c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000080)={0xb2, &(0x7f0000000180)=""/178}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_G_TUNER(r9, 0xc054561d, &(0x7f0000001a00)={0xb72f00, "df21887b2966455d201073f74afeb7a952553d706d1b8603121fcce4c7fbfeaf", 0x2, 0x800, 0x7da0, 0x5, 0x9, 0x4, 0x7, 0x9}) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r10 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x4593, 0x2) ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 937.583831][T19023] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:55 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:55 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000080)=0x5, 0x8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 937.724880][T19017] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 937.751393][T19048] XFS (loop3): Invalid device [.], error=-15 [ 937.753307][T19017] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:55 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x5, 0x42400) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000000c0)=[r3, r1, r5, r6, r8, 0xffffffffffffffff], 0x6) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x333040) getsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 937.847491][T19048] XFS (loop3): Invalid device [.], error=-15 07:55:56 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 937.975706][T19023] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7a00) [ 938.109692][T19069] XFS (loop3): Invalid device [.], error=-15 07:55:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, r1, 0x0, 0x718a68ecfbfd1b5e, r2) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)="2fb6822140e1952e57a5437ab8db6744b02487c6b454a4b9dbe31f3adad37c697e38005385d86c4de9b66f0d8f5af62c8f90cfce8e765b8d1ebd53017a70659e2dcc44bb9f0d0eab1fff640c97af4a27aa38b3173d2bce6300cc6086b3ec8aacbecfd4da42e58d20d08a693466127b91607717d04c34c2561f55b6c29e2ff9f0c05a8efb51cd02d24566aa91bd5dfe83bdd3ccb3e9e2af9dcd9c8f20ea882053fef9b2b0c36940f8a5aad8ecac5690c9610caf79beef4162067ce57322572ced735c2d2e239fbc1f35fc03dc80b15410a3ec79d12a459988", 0xd8, r1) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/158, 0x9e) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 938.179828][T19028] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 938.206547][T19069] XFS (loop3): Invalid device [.], error=-15 [ 938.419174][T19017] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 938.442187][T19068] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 07:55:56 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getpeername$netrom(r2, &(0x7f0000000000)={{0x3, @null}, [@rose, @default, @remote, @remote, @bcast, @netrom, @rose, @null]}, &(0x7f0000000080)=0x48) 07:55:56 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x8, 0x9}) dup(0xffffffffffffffff) 07:55:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e00) 07:55:56 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000040)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000080)=0x1, 0x4) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 938.874546][T19102] XFS (loop3): Invalid device [.], error=-15 [ 938.943355][T19102] XFS (loop3): Invalid device [.], error=-15 07:55:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x40, 0x2}, 0x2}}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)="f4d64d35bc7aed11c376eb5ae376d6710c29ab1f6154012c60c1b6771c0e7cba164f0164dca0719aa9752d70", 0x2c}], 0x1, &(0x7f0000000180)="f315aefbe00584ec11d2d32af089d09b8688fd6712cb9bdcdae46f478d5fdb37d3d9f420444f7ec89e87b94bfa7615113325c4dcad7d3ffadd7dedb2cec76b57a0362b68cae28e1f7885b486b66287def91f39f61cb96719ee9f4c47dae9ff239fbf8f8e484e5139237d56155714a26d13d08415b83a473294d6b1c832db0894b3c826acfaeeea28386a7c51317138d55cbfd708f7bd50a1022ed7f6f01e0cb5f0aec9143b2198dfc183a7e085105996f1fab1f35fcca14d46e14bdfbbf90910a108d29a6527682b1b181207537f5c9a0af2099938e40cc8bbf4745f9bcf1fce32cc7566e316b431f6d11342399638f8c078f9ea68297d7294", 0xf9, 0x4000000}, 0x8000) dup(0xffffffffffffffff) 07:55:57 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="052e67e2392029cb77f120cb168d54c486"], 0xb, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:57 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:57 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r7, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r7, 0x10000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r8, 0x1}, &(0x7f00000001c0)=0x8) dup(0xffffffffffffffff) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) bind$bt_l2cap(r9, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x9600) [ 939.231871][T19129] XFS (loop3): Invalid device [.], error=-15 [ 939.306919][T19129] XFS (loop3): Invalid device [.], error=-15 07:55:57 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000180)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x8, 0xb3}, {0x5, 0x5, 0x6, 0x8}]}) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000080)) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000340)=ANY=[@ANYBLOB="040000000000f9000000000000000100008000000000010000000000000007000000000000000000f6f5fa7d782e8504617eda71ccca80b5a3525ff151750f97530b4fc1e853024434"]) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r8, 0x65, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r10 = dup(r5) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f000000a380)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/213, 0xd5}, {&(0x7f0000000280)=""/9, 0x9}], 0x2, &(0x7f00000005c0)=""/57, 0x39}, 0x1}, {{&(0x7f0000000640)=@llc, 0x80, &(0x7f0000001d00)=[{&(0x7f00000006c0)=""/148, 0x94}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000780)=""/109, 0x6d}, {&(0x7f0000001880)=""/219, 0xdb}, {&(0x7f0000001980)=""/125, 0x7d}, {&(0x7f0000001a00)=""/227, 0xe3}, {&(0x7f0000001b00)=""/106, 0x6a}, {&(0x7f0000001b80)=""/213, 0xd5}, {&(0x7f0000000800)=""/14, 0xe}, {&(0x7f0000001c80)=""/128, 0x80}], 0xa, &(0x7f0000001dc0)=""/173, 0xad}, 0xfffffffb}, {{&(0x7f0000001e80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000002300)=[{&(0x7f0000001f00)=""/82, 0x52}, {&(0x7f0000001f80)=""/97, 0x61}, {&(0x7f0000002000)}, {&(0x7f0000002040)=""/206, 0xce}, {&(0x7f0000002140)=""/218, 0xda}, {&(0x7f0000002240)=""/136, 0x88}], 0x6, &(0x7f0000002380)=""/180, 0xb4}, 0x4}, {{0xfffffffffffffffd, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002440)=""/194, 0xc2}, {&(0x7f0000002540)=""/212, 0xd4}, {&(0x7f0000002640)=""/92, 0x5c}], 0x3, &(0x7f0000002700)=""/77, 0x4d}, 0x1}, {{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f0000002780)=""/170, 0xaa}, {&(0x7f00000059c0)=""/4096, 0x1000}], 0x3, &(0x7f0000002880)=""/27, 0x1b}, 0xffffffff}, {{&(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000002940)=""/118, 0x76}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, &(0x7f0000007a00)=""/4096, 0x8bc}, 0x4}, {{&(0x7f0000008a00)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000009b40)=[{&(0x7f0000008a80)=""/4096, 0x1000}, {&(0x7f0000009a80)=""/192, 0xc0}], 0x2, &(0x7f0000009b80)=""/230, 0xe6}, 0x40}, {{0x0, 0x0, &(0x7f000000a280)=[{&(0x7f0000009c80)=""/59, 0x3b}, {&(0x7f0000009cc0)=""/185, 0xb9}, {&(0x7f0000009e40)=""/206, 0xce}, {&(0x7f0000009f40)=""/167, 0xa7}, {&(0x7f000000a000)=""/154, 0x9a}, {&(0x7f000000a0c0)=""/184, 0xb8}, {&(0x7f000000a180)=""/9, 0x9}, {&(0x7f000000a1c0)=""/59, 0x3b}, {&(0x7f000000a200)=""/109, 0x6d}], 0x9, &(0x7f000000a340)=""/9, 0x9}}], 0x8, 0x10000, 0x0) ioctl$CAPI_GET_PROFILE(r10, 0xc0404309, &(0x7f00000001c0)=0x200) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 07:55:57 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:57 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000000080)={0x40, &(0x7f0000000040)="5155f9730bd6646b252231525166f70f99e067c78f82120ac086a9bfeaaf4a7a897707d50514f33ce5d0bcfa3dd48a7498bfd7988d2ef30c7b8528289f097bd4"}) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:55:57 executing program 0: semget$private(0x0, 0x207, 0x20) [ 939.643365][T19146] XFS (loop3): Invalid device [.], error=-15 07:55:57 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x101000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:55:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xff00) [ 939.741411][T19146] XFS (loop3): Invalid device [.], error=-15 07:55:57 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='mime_type\x00', 0xa, 0x2) dup(0xffffffffffffffff) socket$bt_cmtp(0x1f, 0x3, 0x5) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r6, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r6, &(0x7f00000000c0)) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0xfffffffffffffe59) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-ce\x00'}, 0x58) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0xfff0) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000001a00)=[{{&(0x7f0000000340)=@sco, 0x80, &(0x7f0000000940)=[{&(0x7f00000004c0)=""/214, 0xd6}, {&(0x7f0000000640)=""/117, 0x75}, {&(0x7f00000006c0)=""/170, 0xaa}, {&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000780)=""/69, 0x45}, {&(0x7f0000000880)=""/169, 0xa9}], 0x7, &(0x7f00000009c0)=""/130, 0x82}}, {{&(0x7f0000000a80)=@caif=@util, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000b00)=""/128, 0x80}, {&(0x7f0000000b80)=""/138, 0x8a}, {&(0x7f0000000c40)=""/104, 0x68}, {&(0x7f0000000cc0)=""/187, 0xbb}, {&(0x7f0000000d80)=""/117, 0x75}, {&(0x7f0000000e00)=""/91, 0x5b}], 0x6}}, {{&(0x7f0000000f00)=@rc, 0x80, &(0x7f0000000800)=[{&(0x7f0000000f80)=""/111, 0x6f}], 0x1, &(0x7f0000001000)=""/135, 0x87}, 0x2}, {{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f00000010c0)=""/40, 0x28}], 0x1}, 0x4}, {{&(0x7f0000001140)=@sco, 0x80, &(0x7f0000001380)=[{&(0x7f00000011c0)=""/111, 0x6f}, {&(0x7f0000001240)=""/123, 0x7b}, {&(0x7f00000012c0)=""/175, 0xaf}], 0x3, &(0x7f00000013c0)=""/135, 0x87}, 0x7fff}, {{&(0x7f0000001480)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000001500)=""/56, 0x38}, {&(0x7f0000001540)=""/181, 0xb5}, {&(0x7f0000001600)=""/206, 0xce}, {&(0x7f0000001700)=""/160, 0xa0}, {&(0x7f00000017c0)=""/27, 0x1b}, {&(0x7f0000001800)=""/90, 0x5a}], 0x6, &(0x7f0000001900)=""/206, 0xce}, 0xff}], 0x6, 0x0, 0x0) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xffffffffffffff17) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_G_CROP(r9, 0xc014563b, &(0x7f00000001c0)={0x4, {0xfffffffa, 0x80000001, 0x1, 0x9}}) r13 = accept$alg(r5, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000009d80), 0x3, 0x4, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)={r14, 0x0, 0x800}) 07:55:58 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:55:58 executing program 0: semget$private(0x0, 0x3, 0x7d7) 07:55:58 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000040)={0x81, 0x3eb, [0x0, 0x2, 0x0, 0x8, 0x1]}) setresgid(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) accept4$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @netrom}, [@remote, @remote, @remote, @rose, @null, @default, @default, @netrom]}, &(0x7f0000000240)=0x48, 0x800) write$binfmt_misc(r4, &(0x7f0000000080)={'syz1', "f1ec6ebb3802af0c4e0afbd793a4a4968d509ca6231b7de19f43e5a949e79668151248187289d747880eb5d8eb99f5d4acb4b713ab81349f9825202c323590c481fa347f7aaa0ae2ab171b5365368319183a83bcb38f"}, 0x5a) [ 940.112045][T19172] XFS (loop3): Invalid device [.], error=-15 07:55:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0xc, 0x0, 0x3c43, 0x501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0xd) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x800) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000180)={0x0, 0xff, 0x3, 0x3, 0x40, 0x8001}) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) [ 940.280802][T19172] XFS (loop3): Invalid device [.], error=-15 07:55:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x105100) 07:55:58 executing program 0: semget$private(0x0, 0x207, 0xa00) r0 = semget$private(0x0, 0x4, 0xf0) semop(r0, &(0x7f0000000000), 0x0) r1 = socket(0x10, 0xa, 0x6) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r5, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000)={r5, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 07:55:58 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 940.402803][T19179] kvm [19177]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:55:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x2, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 940.604748][T19201] XFS (loop3): Invalid device [.], error=-15 07:55:58 executing program 0: semget$private(0x0, 0x207, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x5abfedfccadb53b9, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000280)='team_slave_1\x00') ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)={0x2}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$KDSKBSENT(r8, 0x4b49, &(0x7f00000000c0)="860cdd6f23d87d1e75fba1dbe0acbd297ed07c62426122bc8424a0510ed66e497f0f2c671872455ba78d535a580fba86a40a") write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r5, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r5, 0xc}}, 0x10) 07:55:58 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x80, 0x5, 0x0, 0x7c4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) inotify_init() r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup(r1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fstat(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) [ 940.732986][T19201] XFS (loop3): Invalid device [.], error=-15 07:55:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x46, 0x0, 0x0, 0xff, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x80}, 0x0, 0x5, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f00000001c0)) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000000c0)=0x20, 0x4) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r2, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="cb673cea0baaad149092bde2a56975512c75af80dddd7a70fd3a6567da4a0b0bd3a06b8697a4b5f21f69067bf806e8805e58964c34be91a8e6fd50628b27c6dd8018257439711dfabbae61a957eca2de822a01bbbf6c6252b23066dd", 0x5c, 0xfffffffffffffff9) keyctl$assume_authority(0x10, r3) dup(0xffffffffffffffff) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, {0x5, 0x0, 0x0, 0x10, 0x32, 0x5}, 0x1f, 0x1}, 0xe) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x1a0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) dup(r3) 07:56:01 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x200000) 07:56:01 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:01 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000040)={0x81, 0x3eb, [0x0, 0x2, 0x0, 0x8, 0x1]}) setresgid(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) accept4$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @netrom}, [@remote, @remote, @remote, @rose, @null, @default, @default, @netrom]}, &(0x7f0000000240)=0x48, 0x800) write$binfmt_misc(r4, &(0x7f0000000080)={'syz1', "f1ec6ebb3802af0c4e0afbd793a4a4968d509ca6231b7de19f43e5a949e79668151248187289d747880eb5d8eb99f5d4acb4b713ab81349f9825202c323590c481fa347f7aaa0ae2ab171b5365368319183a83bcb38f"}, 0x5a) 07:56:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x80, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000700)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60c4cb14c9bed5c54dbb7295df0df8217ad62005127000000000000e60000", 0x34) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) write$UHID_DESTROY(r7, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r8, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, 0x0, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x9) setresgid(0x0, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f00000006c0)=[{{&(0x7f0000000380)=@nfc, 0x21c, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/94}, {&(0x7f0000000540)=""/13}], 0x0, &(0x7f0000000640)=""/79}, 0x8}], 0x40000f4, 0x10000, 0x0) r15 = socket$inet(0x2, 0x4000000805, 0x0) r16 = socket$inet_sctp(0x2, 0x5, 0x84) r17 = dup3(r15, r16, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r16, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r17, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r16, &(0x7f00003cef9f)='7', 0x1, 0x40d5, &(0x7f0000618000)={0x2, 0x4a20, @local}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r17, 0x84, 0x7a, &(0x7f000059aff8)={r18}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r18}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r18, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r14, 0x84, 0x1f, &(0x7f0000000040)={r18, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x2, 0x3}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r11, 0x84, 0x70, &(0x7f00000001c0)={r19, @in6={{0xa, 0x4e22, 0x6, @mcast2, 0x20}}, [0x89, 0xcfbe, 0x40, 0x3ff, 0xfffffffffffffffb, 0x10001, 0x1f, 0x80, 0x46, 0x6, 0x5, 0x2, 0x9, 0x7, 0x98b]}, &(0x7f00000002c0)=0x100) [ 943.413380][T19318] XFS (loop3): Invalid device [.], error=-15 [ 943.525092][T19318] XFS (loop3): Invalid device [.], error=-15 07:56:01 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x2, @rand_addr="b27e5714a47f88701efeb9eae81cb593", 0x90f7}}, 0x3f, 0x1}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000280)={r7, 0xfcd4}, 0x8) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1a3400, 0x0) ioctl$PERF_EVENT_IOC_ID(r8, 0x80082407, &(0x7f00000000c0)) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r9, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:01 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x400000) 07:56:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x26104, 0xb20e986e6f897ddb) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000040)=""/109, 0x6d) dup(0xffffffffffffffff) [ 943.752259][T19342] XFS (loop3): Invalid device [.], error=-15 07:56:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="7cdcd6efa9af6ccb998afb132f8d77688ff2e68a746a377f", 0xffffffffffffff3c) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$KDGKBMETA(r7, 0x4b62, &(0x7f00000000c0)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 943.848015][T19342] XFS (loop3): Invalid device [.], error=-15 07:56:02 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 943.993414][T19345] QAT: Invalid ioctl 07:56:02 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000040)={0x81, 0x3eb, [0x0, 0x2, 0x0, 0x8, 0x1]}) setresgid(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) accept4$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @netrom}, [@remote, @remote, @remote, @rose, @null, @default, @default, @netrom]}, &(0x7f0000000240)=0x48, 0x800) write$binfmt_misc(r4, &(0x7f0000000080)={'syz1', "f1ec6ebb3802af0c4e0afbd793a4a4968d509ca6231b7de19f43e5a949e79668151248187289d747880eb5d8eb99f5d4acb4b713ab81349f9825202c323590c481fa347f7aaa0ae2ab171b5365368319183a83bcb38f"}, 0x5a) [ 944.070503][T19345] QAT: Invalid ioctl [ 944.105702][T19365] XFS (loop3): Invalid device [.], error=-15 07:56:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x19b9b, &(0x7f0000000000)={'ipddp0\x00', @ifru_flags=0x3000}) dup(0xffffffffffffffff) 07:56:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = dup2(r0, 0xffffffffffffffff) getdents(r1, &(0x7f0000000200)=""/146, 0x92) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r2, 0xffffffffffffffff) chdir(&(0x7f00000000c0)='./file0\x00') dup(0xffffffffffffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8080, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r4, 0xc06855c8, &(0x7f00000002c0)={0x2, 0x1, {0x57, 0x9, 0x2, {0xff, 0x8}, {0x101, 0x6}, @const={0x1, {0x6, 0xb24d, 0x1ff}}}, {0x7d400a53f8c5d62b, 0x8, 0x400, {0x0, 0x1}, {0x81, 0x9}, @rumble={0x8, 0x4}}}) 07:56:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x511000) [ 944.246123][T19365] XFS (loop3): Invalid device [.], error=-15 07:56:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x50200) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000040)=""/143) dup(0xffffffffffffffff) 07:56:02 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000), &(0x7f0000a8a000)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={0x0}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000600)={r6, 0xffffff60, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753438d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8adec9ad0178c041c91c5421a3e86554181c4b197a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb49bcbf6519c5cc5bfc0e2a9398237f0af58fd46f9e4a01fb1f89fe500000000000000000000cbc1c398bbc9c4244c3f77f1db5984bad3dee5bbe2b4b511b3f3d323463085f792e272098aa1"}, &(0x7f0000000340)=0xcb) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="e1000000eff9fffa5b03dc10dff73ccb57fbc3e9b061db83ea6404e7a1bef373b59919973adf7087e178ba5e5f54d904f4ec191288d51af0c035b15ff81180a24ffc97709158d08cd8a26b54877b8438fec354690ae897d7b856fcb6a035073e2dd3f2f05544e87265ce1c9d4fe66a7943c18425d0c7a1581bdd8ff7e38aaa68b3e49141e1e09389ebf6918e005dd2db5ff9f8315f8e6448142b1c67e6240fb055c752836cb9f14cbf56394cb0cd77c19ef8970e9ad1b8fc0901d32473c68bee59fb72ec8b6e402af55c7c6475f267114fd977f559db728f4dc8f6a09509dfe1ad610b0aa02718bc1687de67ea36105bdb2621102a"], &(0x7f0000000040)=0xe9) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x3, 0xc206, 0x1f, 0x7, r13}, &(0x7f00000000c0)=0x10) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r15 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r16 = dup(0xffffffffffffffff) fsconfig$FSCONFIG_SET_FD(r16, 0x5, &(0x7f00000003c0)='\x00', 0x0, r15) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r17 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r17, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r17, 0x6, 0x1, 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r15, 0xc008ae05, &(0x7f0000000380)=""/35) setresgid(0x0, 0x0, 0x0) 07:56:02 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:02 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000040)={0x81, 0x3eb, [0x0, 0x2, 0x0, 0x8, 0x1]}) setresgid(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) accept4$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @netrom}, [@remote, @remote, @remote, @rose, @null, @default, @default, @netrom]}, &(0x7f0000000240)=0x48, 0x800) write$binfmt_misc(r4, &(0x7f0000000080)={'syz1', "f1ec6ebb3802af0c4e0afbd793a4a4968d509ca6231b7de19f43e5a949e79668151248187289d747880eb5d8eb99f5d4acb4b713ab81349f9825202c323590c481fa347f7aaa0ae2ab171b5365368319183a83bcb38f"}, 0x5a) 07:56:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r4, 0x4008700e, 0x6) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000080)={0x4, [0x0, 0x0, 0x0, 0x0]}) [ 944.609319][T19394] XFS (loop3): Invalid device [.], error=-15 07:56:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x710000) 07:56:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000002080)=[{{&(0x7f0000000180)=@hci, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/224}, {&(0x7f0000000500)=""/33}, {&(0x7f0000000540)=""/185}, {&(0x7f0000000640)=""/90}, {&(0x7f00000006c0)=""/12}, {&(0x7f0000000700)=""/163}, {&(0x7f0000001880)=""/131}, {&(0x7f0000002340)=""/4096}], 0x0, &(0x7f0000001940)=""/35}, 0xffffffff}, {{&(0x7f0000001980)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001a00)=""/216}, {&(0x7f0000001b00)=""/3}, {&(0x7f0000002140)=""/5}, {&(0x7f00000049c0)=""/4096, 0x5d}, {&(0x7f00000059c0)=""/4088}, {&(0x7f0000001b80)=""/164}], 0x0, &(0x7f0000001cc0)=""/23}, 0x400}, {{&(0x7f0000001d00)=@l2, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001d80)=""/21}, {&(0x7f0000001dc0)=""/153}, {&(0x7f0000001e80)=""/126}, {&(0x7f0000001f00)=""/142}], 0x0, &(0x7f0000002000)=""/99}, 0x2}], 0x579, 0x2000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14ee3256, 0x4214, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x50}, 0x0, 0x0, 0x3, 0x7}, 0x0, 0x0, r2, 0x0) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000021c0)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000022c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000002300)={@rand_addr="fba64cfcae9bb64ed9ae4bb5f5dd4fb9", 0x7a, r4}) [ 944.733684][T19394] XFS (loop3): Invalid device [.], error=-15 07:56:02 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x200}, [@ldst={0x1, 0x3, 0x6, 0xa, 0x2, 0xffffffffffffffdd, 0x1}, @generic={0x2, 0xc, 0x9, 0x1, 0x7}, @map_val={0x18, 0x6, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @map={0x18, 0x5, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x1, 0xb, 0xa, 0x80, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x0, 0x5, 0x4, 0x0, 0x4}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x4b, &(0x7f00000001c0)=""/75, 0x41000, 0x2, [], 0x0, 0xf, r2, 0x8, &(0x7f0000000240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x8, 0x4, 0x3420}, 0x10}, 0x70) dup(r3) r4 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r4, 0xffffffffffffffff) dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:03 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 945.068679][T19421] XFS (loop3): Invalid device [.], error=-15 07:56:03 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:03 executing program 4: perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x400000000005}, 0x42, 0x1, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) read(r2, &(0x7f0000000080)=""/58, 0x3a) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r5, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r6, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r7, 0x0, 0x0) r8 = accept$alg(r0, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r9, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 945.171728][T19421] XFS (loop3): Invalid device [.], error=-15 07:56:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x719000) 07:56:03 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x14fa0eb893b4983c, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000280)=""/239, &(0x7f0000000180)=0xef) msgget(0x0, 0x9cf4bd10f8e70fae) r1 = semget$private(0x0, 0x207, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000640)={0x1, 0x2, 0x1000, 0xc5, &(0x7f00000004c0)="ba43ec0b3356c79d79845572f04d6d603e03767091f6898e83fc0fff4213807d313017cb8b683a940d3b264a0dc2ac6a7ebeb0ff36b25f340a008ce03cb85c31f49c6106762656bc5f9eb8cf94e05634962bfb51ae57a0cf60fdd701c4a6e55da145b58c91351008c21c5dd62ff832686717b9e85fbdf5a92deb2b20c8b2610814298a385efe226fd51f9d3ff044446370330a144d705d6c1606b1e5c7899b1d8655994d27bca2aee384fbb177db084093c4d7145073ddc8997d69d32a552728b9281aefbf", 0x74, 0x0, &(0x7f0000000380)="1bb63943e55d3a61a3116510c4812ca0fedbbef395e4d9bfe5a8fe413c688d1092a8968954273483d23e5c08778be4b39ac671e77e764282f7f3b66af3492807e5344743ea828c61986681ba8fb30e3727f378909c706467baa0b3c0f438873cb35fa175de250bd6c7043a2ece046a9788bcc9c9"}) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:03 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000), &(0x7f0000a8a000)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={0x0}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000600)={r6, 0xffffff60, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753438d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8adec9ad0178c041c91c5421a3e86554181c4b197a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb49bcbf6519c5cc5bfc0e2a9398237f0af58fd46f9e4a01fb1f89fe500000000000000000000cbc1c398bbc9c4244c3f77f1db5984bad3dee5bbe2b4b511b3f3d323463085f792e272098aa1"}, &(0x7f0000000340)=0xcb) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="e1000000eff9fffa5b03dc10dff73ccb57fbc3e9b061db83ea6404e7a1bef373b59919973adf7087e178ba5e5f54d904f4ec191288d51af0c035b15ff81180a24ffc97709158d08cd8a26b54877b8438fec354690ae897d7b856fcb6a035073e2dd3f2f05544e87265ce1c9d4fe66a7943c18425d0c7a1581bdd8ff7e38aaa68b3e49141e1e09389ebf6918e005dd2db5ff9f8315f8e6448142b1c67e6240fb055c752836cb9f14cbf56394cb0cd77c19ef8970e9ad1b8fc0901d32473c68bee59fb72ec8b6e402af55c7c6475f267114fd977f559db728f4dc8f6a09509dfe1ad610b0aa02718bc1687de67ea36105bdb2621102a"], &(0x7f0000000040)=0xe9) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x3, 0xc206, 0x1f, 0x7, r13}, &(0x7f00000000c0)=0x10) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r15 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r16 = dup(0xffffffffffffffff) fsconfig$FSCONFIG_SET_FD(r16, 0x5, &(0x7f00000003c0)='\x00', 0x0, r15) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r17 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r17, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r17, 0x6, 0x1, 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r15, 0xc008ae05, &(0x7f0000000380)=""/35) setresgid(0x0, 0x0, 0x0) 07:56:03 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xff', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:03 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000000c0)={0x12, 0xe3, &(0x7f00000001c0)="e7787d3cb81efa541682eb99c5f65d6cbc232c29bba4dedd03a496a0abf622ef12aa01cb11f53bb823e012c62dc60b6fb08b364d0fe3162f108d89b2514bfc17ae49b6b1a1263813c5856f56161e029fe53b5b6f5b9695f043ad4b87f42351b9be663c9b2f770b5d2507a53066e0b441860d86de982a7b77d7ba3dfe9334e5e472c4cf41be8932e6a94b98e7741d2c36cb8557f833e27bdcd011ff3fccee764fd6fcf38241acb7f1fb789727b8bcb862c32b285c6d1caa827ee49c70ea7bd929c265bca422b168ebb06b17ad6234ec6078325c6f6628510c16c65723058b8dd6c42146"}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000080)=0x7ff) 07:56:03 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) bind$rose(r1, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @bcast}, 0x1c) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 945.652636][T19452] kvm [19451]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:56:03 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x760000) 07:56:04 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x6, 0x0, 0x6}}, 0x28) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0xfffffff8, &(0x7f0000000840)=[{&(0x7f0000000600)=""/21, 0x15}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x1de}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r6, 0x10e, 0x6, &(0x7f0000000080)={0x1, 0x0, 0x4, 0xaa4}, 0x10) dup(0xffffffffffffffff) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0xfc}}, 0xe) setresgid(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r6, 0x40086432, &(0x7f0000000180)=0x6) [ 945.945453][T19469] XFS (loop3): Invalid device [.], error=-15 07:56:04 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xc, 0x2) getsockname$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x10) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x40089190, &(0x7f0000000040)="3e642a0a63f3240b3371d4f46a413de26626abb5efff68b107d1bf3983ee61e5707f0e99998d8b6ae215b73860fa30ad79fa1434e8f0918f6cad01fc2d34a19599ac52b9c158bc9562896eac7b8856975839b04c21ee2fb9226b39b11533f8fcc7b5928ba8923522385cacb2fbd9352f7f") ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = syz_open_dev$adsp(&(0x7f0000001600)='/dev/adsp#\x00', 0xff, 0x400000) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000001640)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) 07:56:04 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x14fa0eb893b4983c, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000280)=""/239, &(0x7f0000000180)=0xef) msgget(0x0, 0x9cf4bd10f8e70fae) r1 = semget$private(0x0, 0x207, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000640)={0x1, 0x2, 0x1000, 0xc5, &(0x7f00000004c0)="ba43ec0b3356c79d79845572f04d6d603e03767091f6898e83fc0fff4213807d313017cb8b683a940d3b264a0dc2ac6a7ebeb0ff36b25f340a008ce03cb85c31f49c6106762656bc5f9eb8cf94e05634962bfb51ae57a0cf60fdd701c4a6e55da145b58c91351008c21c5dd62ff832686717b9e85fbdf5a92deb2b20c8b2610814298a385efe226fd51f9d3ff044446370330a144d705d6c1606b1e5c7899b1d8655994d27bca2aee384fbb177db084093c4d7145073ddc8997d69d32a552728b9281aefbf", 0x74, 0x0, &(0x7f0000000380)="1bb63943e55d3a61a3116510c4812ca0fedbbef395e4d9bfe5a8fe413c688d1092a8968954273483d23e5c08778be4b39ac671e77e764282f7f3b66af3492807e5344743ea828c61986681ba8fb30e3727f378909c706467baa0b3c0f438873cb35fa175de250bd6c7043a2ece046a9788bcc9c9"}) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 946.120285][T19469] XFS (loop3): Invalid device [.], error=-15 07:56:04 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f00000000c0)={0x2b, 0x1}) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:04 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xff', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:04 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x4, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x7fff}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd1}}, {@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x5e5b}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x7}}]}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x907100) 07:56:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x0, @dev}}, 0x0, 0x200, 0x0, "4c64629d860e03f6a34df9a37d1e2ccc3591791bbb8370ec86f92fd379698e322942983c45829c44c7e3c40e5991c33ef50b542af96ea8275d1226f03f98155ee424c9384af479b6dc6a60e6442d3383"}, 0xd8) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:04 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000380)={0xa, 0x4}, 0xc) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xa925}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYBLOB="0000000000000000140012000c00010062726964676500000300020092ab29e6bc90313f5c14a8d5d4534e466f18e765b4fd2a0e0ffabd5f884b8215627962f7a4aab6691329692afb3fdcc3e7378871f430fe0e63a139f8432b7c88d952fec2b4b0543063914575e89dce08917ef4c83982304f91f231dc1ecf62c4bf0541ff2b5060b6a4d69b9403c96422fd8632e43e946636599dedd725bcd83c8971198e43e29e4b1c15388e01dee5bf7c4e128ff5b5c146c15db0684e76186c1d4209d8b4158f7b359d8efa69231277e09c47884e9fb0b010687409fc6fa73c91c9504b4460a91a865e0897f10dc1c1e0edc0d560f18478d67cc5cf8dbb0ee5003f6cc7185e99bc93bcb9eb76abba12076a8d076c85"], 0x2}}, 0x0) readlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)=""/35, 0x23) dup(0xffffffffffffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:04 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000180)="870867a15a4ed74ac09d7a1eb1b496742b79ab25c0fe93831eed9dfb82e5c4044ad3b1130617896d95ea59340150d4dc3ed9c793aef495eb414fadeb85c062fbabfa14c19dbcfd3755f4e71e1ff8099de666e9ef8aca72bf205516f240b738d2", 0x60, 0xe89a377}, {&(0x7f0000000200)="00219985166923d97c495c69c400099a6c119c2b0420ac5993608225836e8427aac9294e2814f0ea0f6d5d872c99bfe9901aca93b9fbd124c493dea55f1b19ab945813d7f75ec2d0facefa22a615a50b9eee7f6148a47a4993f8b9", 0x5b, 0x20}, {&(0x7f0000000280)="8bd1146d48a8729bff2252265418e1e01d657a86da2c70f57f89292a97073cccd0a0aa5cf9723e5b6d867d08d20eb9079545c9f078608be0bb04038fb7fc0f5aff0ea559c9aa6be3d9a11f2d8e04308d27fae759bd59dd7e93e2badc412a3d842d1002dbe849ef9867915d61ffd9e717fbc9b8c439d1121ea04e3474b81ff6955765ec37f627c468b227555c9825f0", 0x8f, 0x100000000}, {&(0x7f0000000340)="0b58ade081d5556f703292c921b00d047e362164ea6cce9b82449dc46e16f6af228558c62fcf9b0ad780a802f0ec9a3371a45cb3e0cc3462003e47e8e6d723ef13d42cf40cc8777645b5d4065344a2350618c9a9fb745b546f7030f5edd9c7ede98752f02e658b01816a679b7e3e66bc96e3001b4e1ba3e5d51e8b76dce86ce4866460422fda9a95655543b743e3d87140c092e7d2666434c13d2ef655b90c9d64e376c52c7cc0e657fcaff4c401f57f7eb92e96c3aac6d02d30bd4356c1fd824618049b4c4de91772a656bf3b5572b77085cf2f5bb4cf71", 0xd8, 0x1}, {&(0x7f0000000440)="e43d07f9868f7af064a4124f9c471c6cabfee035e1173b74571c5fcd8e9144ff0e2950a2730e4dbc64e3bdccfa87cdf48df6f8f6a86266995ab944e3a5d038397a9a699055663b41aada5b0b317262ace1f07233444bf032", 0x58, 0x1000}, {&(0x7f00000004c0)="89668b7ad3d8d6d24966273773b149e30f68ea1e35c301490edf290b19448eef66d973c9ca94f972bd9249ac3e49428beef322bf02cb9190222ec3fbfb0063e92a1b0baae47769cbfac6089be3396f987d454df05cf96d5490367a074b2288378c5a6c263fe53e5b92830e28c450dcb2b30aee14b3acde088ad14542ed7d99fb4f308076cd7c3952a2419d05ebc95cfda5983f58b42e2e067ded2d31ecab4af14199b0673698809f1253bc9f464187c66bba0fcb95498286aa6d02c8fcd3fc28af0270eddd26957365c2b99639fd27d8af49", 0xd2, 0x2}], 0x909002, &(0x7f00000000c0)='\x00') setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:04 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xff', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2081, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) dup(0xffffffffffffffff) 07:56:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x960000) [ 946.912456][T19527] overlayfs: failed to resolve 'file0ÿÿÿ': -2 07:56:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x0, @dev}}, 0x0, 0x200, 0x0, "4c64629d860e03f6a34df9a37d1e2ccc3591791bbb8370ec86f92fd379698e322942983c45829c44c7e3c40e5991c33ef50b542af96ea8275d1226f03f98155ee424c9384af479b6dc6a60e6442d3383"}, 0xd8) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r2 = dup2(r1, 0xffffffffffffffff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x400000000000308, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000d00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0xa28}, 0x1, 0x0, 0x0, 0x48041}, 0x1015) accept4$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c, 0x0) dup(0xffffffffffffffff) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000), 0xe) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0xc78, 0x401}, 0x8) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) setsockopt$bt_BT_SECURITY(r7, 0x112, 0x4, &(0x7f00000000c0)={0x5, 0x40}, 0x2) 07:56:05 executing program 2: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:05 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x0, @dev}}, 0x0, 0x200, 0x0, "4c64629d860e03f6a34df9a37d1e2ccc3591791bbb8370ec86f92fd379698e322942983c45829c44c7e3c40e5991c33ef50b542af96ea8275d1226f03f98155ee424c9384af479b6dc6a60e6442d3383"}, 0xd8) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x1000000) 07:56:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x81, 0x20000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x4, 0xffffffff, 0x100}) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r5, 0xc0045520, &(0x7f00000003c0)=0x7c) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r2, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0xc3, 0x0}}], 0x3, 0x0, 0x0) recvmsg$can_j1939(r7, &(0x7f0000000380)={&(0x7f0000000080)=@nl=@proc, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/201, 0xc9}, {&(0x7f0000000280)=""/67, 0x43}], 0x2, &(0x7f0000000340)=""/23, 0x17}, 0x2) dup(0xffffffffffffffff) 07:56:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r6, 0x10e, 0xa, &(0x7f00000000c0)=0x1, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000180)='user\x00'}, 0x30) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r7, 0xc0096616, &(0x7f0000000280)={0x2, [0x0, 0x0]}) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000080)=0x2) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r8, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 947.468732][T19565] XFS (loop3): Invalid device [.], error=-15 07:56:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x0, @dev}}, 0x0, 0x200, 0x0, "4c64629d860e03f6a34df9a37d1e2ccc3591791bbb8370ec86f92fd379698e322942983c45829c44c7e3c40e5991c33ef50b542af96ea8275d1226f03f98155ee424c9384af479b6dc6a60e6442d3383"}, 0xd8) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 947.546214][T19565] XFS (loop3): Invalid device [.], error=-15 07:56:05 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$UHID_DESTROY(r7, &(0x7f0000000080), 0x7efb) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000040)='\x00') getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:05 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xf9', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fchdir(r4) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 07:56:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2000000) 07:56:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000180)="870867a15a4ed74ac09d7a1eb1b496742b79ab25c0fe93831eed9dfb82e5c4044ad3b1130617896d95ea59340150d4dc3ed9c793aef495eb414fadeb85c062fbabfa14c19dbcfd3755f4e71e1ff8099de666e9ef8aca72bf205516f240b738d2", 0x60, 0xe89a377}, {&(0x7f0000000200)="00219985166923d97c495c69c400099a6c119c2b0420ac5993608225836e8427aac9294e2814f0ea0f6d5d872c99bfe9901aca93b9fbd124c493dea55f1b19ab945813d7f75ec2d0facefa22a615a50b9eee7f6148a47a4993f8b9", 0x5b, 0x20}, {&(0x7f0000000280)="8bd1146d48a8729bff2252265418e1e01d657a86da2c70f57f89292a97073cccd0a0aa5cf9723e5b6d867d08d20eb9079545c9f078608be0bb04038fb7fc0f5aff0ea559c9aa6be3d9a11f2d8e04308d27fae759bd59dd7e93e2badc412a3d842d1002dbe849ef9867915d61ffd9e717fbc9b8c439d1121ea04e3474b81ff6955765ec37f627c468b227555c9825f0", 0x8f, 0x100000000}, {&(0x7f0000000340)="0b58ade081d5556f703292c921b00d047e362164ea6cce9b82449dc46e16f6af228558c62fcf9b0ad780a802f0ec9a3371a45cb3e0cc3462003e47e8e6d723ef13d42cf40cc8777645b5d4065344a2350618c9a9fb745b546f7030f5edd9c7ede98752f02e658b01816a679b7e3e66bc96e3001b4e1ba3e5d51e8b76dce86ce4866460422fda9a95655543b743e3d87140c092e7d2666434c13d2ef655b90c9d64e376c52c7cc0e657fcaff4c401f57f7eb92e96c3aac6d02d30bd4356c1fd824618049b4c4de91772a656bf3b5572b77085cf2f5bb4cf71", 0xd8, 0x1}, {&(0x7f0000000440)="e43d07f9868f7af064a4124f9c471c6cabfee035e1173b74571c5fcd8e9144ff0e2950a2730e4dbc64e3bdccfa87cdf48df6f8f6a86266995ab944e3a5d038397a9a699055663b41aada5b0b317262ace1f07233444bf032", 0x58, 0x1000}, {&(0x7f00000004c0)="89668b7ad3d8d6d24966273773b149e30f68ea1e35c301490edf290b19448eef66d973c9ca94f972bd9249ac3e49428beef322bf02cb9190222ec3fbfb0063e92a1b0baae47769cbfac6089be3396f987d454df05cf96d5490367a074b2288378c5a6c263fe53e5b92830e28c450dcb2b30aee14b3acde088ad14542ed7d99fb4f308076cd7c3952a2419d05ebc95cfda5983f58b42e2e067ded2d31ecab4af14199b0673698809f1253bc9f464187c66bba0fcb95498286aa6d02c8fcd3fc28af0270eddd26957365c2b99639fd27d8af49", 0xd2, 0x2}], 0x909002, &(0x7f00000000c0)='\x00') setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80040, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xe5caa98011f2487c, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="876fd5b86c5213f139bc49cc3c62adff8000f9aee4b64ae356be3b9e92e4ed0200c6c7d89d78893a57ee1c7d5a679e5434948ffc38d774d65c6ab04106395999dc42e0c41ca4310ff2e091fd8272721379b1ba85239b54a5c1ea6f05ce159b0a4ea2dca4201eae070f7c2387df67c1e67a0c35beda90fd4b2bc52c7cbfc0b72cb9ee791ccd9737c80e28ed1403733208dd92a22da5633c52d352d31a3eb7dc1c0055a4274dc5aee56113c33c7b71dd8f129755f572357c2b2f27dfd62bb2f49838", 0xc1) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r2, 0xffffffffffffffff) dup(0xffffffffffffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:06 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x7f', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:06 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000080)={0x0, {0x77359400}, 0x10000, 0xff}) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x50200) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000040)=""/143) dup(0xffffffffffffffff) 07:56:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$capi20_data(r1, &(0x7f0000000000)={{0x10, 0x5, 0x88, 0x2, 0x6, 0x2}, 0x13, "b0d71891015783fa6831832cebabbfd84065fa"}, 0x25) 07:56:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3000000) 07:56:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x1}, 0x4, 0x68}, 0xe) setresgid(0x0, 0x0, 0x0) 07:56:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x3, 0x6058b945197c0410) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x50200) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000040)=""/143) dup(0xffffffffffffffff) 07:56:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) 07:56:06 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x8c', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setregset(0x4205, r1, 0x946fb5f010802276, &(0x7f0000000000)={&(0x7f0000000280)="82c497faf4b8191135927ae655511a0f30111af4e6967b340dd1dbfe8ac70bce16db94030c3089e93adb18fdc52eb5d96624f28a5f783b953f2fa1d4280d222476f558045e6c57e8a87edd4c4d7ed6cb60eedd33fef420279bc979d14b13d4dd6b99a46bd6e11d484bfc18b32d28b55067e803bd3aa1a6eda0cd13d93ffe90095dfdd766570aaa0b809186167f2a8570271e2916390df858976cd5011e69720f545e501f45b52e40503a1328aa76a4b6246baccddfcf8bc3c4a5d41f688f9ba863606798e2c54831b91ea6a945e866a41ca0e82e8990219208cc34f5cf", 0xdd}) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x898fa8c28ab55bcd, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f00000001c0)=0x60, 0x4) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x300) ioctl$SIOCRSACCEPT(r4, 0x89e3) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r2, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r6, 0x111, 0x5, 0x1, 0x4) 07:56:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4000000) 07:56:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000001e40)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/192, 0xc0}, {&(0x7f0000000340)=""/90, 0x5a}, {&(0x7f00000003c0)=""/52, 0x34}, {&(0x7f00000004c0)=""/11, 0xb}, {&(0x7f0000000500)=""/113, 0x71}], 0x5}, 0x4}, {{&(0x7f0000000640)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000800)=[{&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/1, 0x1}], 0x2, &(0x7f0000000880)=""/34, 0x22}, 0x1}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)}, {&(0x7f0000001900)=""/33, 0x21}, {&(0x7f0000001940)=""/24, 0x18}], 0x4, &(0x7f00000019c0)=""/210, 0xd2}, 0xb0}, {{&(0x7f0000001ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001b40)=""/186, 0xba}, {&(0x7f0000001c00)=""/58, 0x3a}, {&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/112, 0x70}, {&(0x7f0000001cc0)=""/218, 0xda}], 0x5}, 0x3c}], 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x0, @remote, 0x80}}, [0x1, 0x8, 0x7f, 0x6, 0x5, 0x272, 0x10001, 0xdee2, 0x0, 0x2, 0x43a, 0x0, 0x3f, 0x3, 0x5]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r6, 0x4) setresgid(0x0, 0x0, 0x0) 07:56:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x50200) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000040)=""/143) dup(0xffffffffffffffff) 07:56:06 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r9, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r12, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x7a, &(0x7f000059aff8)={r13}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r13}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r13, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r13, 0x2, 0xfffffff8, 0xb41}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000180)={r9, 0xa7e5, 0x6b, 0x7f, 0x8000, 0x3, 0x6, 0x7, {r14, @in={{0x2, 0x4e20, @local}}, 0x7fffffff, 0x65, 0x10001, 0x40, 0x800}}, &(0x7f0000000240)=0xb0) setresgid(0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) 07:56:07 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xf6', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:07 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x26104, 0xb20e986e6f897ddb) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000040)=""/109, 0x6d) dup(0xffffffffffffffff) 07:56:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0xbe0dcf63112e6c79, 0x804) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000000)=[0x3, 0x3f, 0x67, 0x100, 0x1c, 0x2, 0x0, 0x7ff, 0xfffe, 0x6]) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)=0x2) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) dup(0xffffffffffffffff) 07:56:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x5000000) 07:56:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x9, 0x2, [0x6, 0x4]}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7fffffff}, 0x8) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) linkat(r5, &(0x7f0000000240)='./file0\x00', r8, &(0x7f0000000280)='./file0\x00', 0x200) dup2(r2, 0xffffffffffffffff) dup(0xffffffffffffffff) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r9, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:07 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x26104, 0xb20e986e6f897ddb) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000040)=""/109, 0x6d) dup(0xffffffffffffffff) 07:56:07 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:07 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0xfffffffffffffda5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000000c0), &(0x7f0000000180)=0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) mq_notify(r3, &(0x7f0000000040)={0x0, 0x15, 0x1, @tid=r4}) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6000000) 07:56:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000000)) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:07 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x26104, 0xb20e986e6f897ddb) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000040)=""/109, 0x6d) dup(0xffffffffffffffff) [ 949.502288][T19705] XFS (loop3): Invalid device [.], error=-15 07:56:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000280)=""/215) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e24, @broadcast}, 0x10) setresgid(0x0, 0x0, 0x0) 07:56:07 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="1713f790a864cfa2aab1756b749ccd4b39e6dc8c3c211d2a51fa781be921238e56fa8209976ab6194dc24306650acc6bc77a7eedaea8c4367dbe3ed6324a89f58be9c1b1a9ef522cab66e3e8ce0378b735412201139204af561d4bbcddedcdc54f564b13c76fb6e867eac2c891dac1487ce662b8e9a0ad42302aa632b51bd34ece279716eb6101b3049504c86ca0a569528c04fea2b937ca5001db9e217b180c907a350a926eaf67e4b2f9f579d182089a92a3ea3a5adeaaed45d41d08", 0xbd) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 949.622966][T19705] XFS (loop3): Invalid device [.], error=-15 07:56:07 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r7, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r7, 0x10000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r8, 0x1}, &(0x7f00000001c0)=0x8) dup(0xffffffffffffffff) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) bind$bt_l2cap(r9, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:07 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7000000) 07:56:08 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x3ea401) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 949.976593][T19737] XFS (loop3): Invalid device [.], error=-15 07:56:08 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) pipe2(&(0x7f0000001540), 0x800) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001580), 0x0) dup(0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r5, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r5, 0x10, 0x1, [0x2]}, &(0x7f00000001c0)=0xa) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000080)={'batadv0\x00', 0x1000}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0xc0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x935a}, 0x0, 0x0, 0x1, 0x7}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r4, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) fsetxattr$security_capability(r7, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x5, 0x5}, {0x7, 0xffffffc0}]}, 0x14, 0x6) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0x4) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f00000000c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x1c) [ 950.078721][T19737] XFS (loop3): Invalid device [.], error=-15 07:56:08 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r7, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r7, 0x10000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r8, 0x1}, &(0x7f00000001c0)=0x8) dup(0xffffffffffffffff) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) bind$bt_l2cap(r9, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:08 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 950.318011][T19751] kvm [19750]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:56:08 executing program 1: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000440)=0x1c) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r9, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={r9, 0x2c, &(0x7f0000000080)=[@in={0x2, 0x4e21, @rand_addr=0x3f}, @in6={0xa, 0x4e20, 0x3, @remote, 0x3}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000001c0)={r10, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) 07:56:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x8000000) [ 950.462630][T19764] XFS (loop3): Invalid device [.], error=-15 07:56:08 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="052e67e2392029cb77f120cb168d54c486"], 0xb, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 950.567265][T19764] XFS (loop3): Invalid device [.], error=-15 07:56:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4, 0x9, 0x2, 0x8, 0x0, 0x15f, 0x10000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x100, 0x8, 0x0, 0x2, 0x1000, 0x1, 0x6c8}, r1, 0x3, r4, 0x1) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:08 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:08 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfc}, 0x2, 0x4}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 950.871860][T19788] XFS (loop3): Invalid device [.], error=-15 07:56:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000280)=0x80000000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000080)={0x7, 0xfff}) r6 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r6, 0xffffffffffffffff) dup(0xffffffffffffffff) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x10200, 0xf7) ioctl$SG_GET_COMMAND_Q(r8, 0x2270, &(0x7f0000000180)) bind$bt_l2cap(r7, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xa000000) 07:56:09 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="052e67e2392029cb77f120cb168d54c486"], 0xb, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x80, 0x0, 0x80, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd, 0x5}]}, 0x30}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="739991f653162ed4aaf3f3b4402f8d3419a65976fbd5ece1d331de4e4c5ae1bac732085942c13ff228839a1fd183cb3d1073adfaf4c09d15b708976ac56a12baa15722b46344ad802ff099e5888442a2b73b37b45887cb7818c2ca21902e9e6a48135884f72f596555840b4b6a7d19f6c668ac54ba90e9534d60dc56d5275238a17a75c87980d795054398a4ab9498aa00831c287de4e290e18476cb3efe157437891143e29457a0a28325f7bb403382caa98c8fcb550d61adb54f23df47623da2346c580f723fac52aa1a61719bea0e7a9618bbc2a165039414c3dac41c507c8636edcf2ba5941b3629fcd2a54248bcea224ab7adca7c081096139b9641e3095a374ad7ddd351969956873d25b90bf09051", 0xfffffffffffffe4e) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xfffb, 0x2, 0x2, 0x8000}, {0x1, 0xf9, 0x3f, 0x7f}, {0x5, 0x1f, 0x8, 0x7ff}]}) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x40}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) r5 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000140)) semctl$SETVAL(r5, 0x3, 0x10, &(0x7f0000000400)=0x6742) name_to_handle_at(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)={0xca, 0x5, "672b819ae0410663d87626d6a4c71615b57bbfc3ddd956491d9fbef38e76a83eb06105f78be63119992029a41c0fddf158c4c6eed6a7f4f7e02b3e0b6f784f895954f7a4752a3cd8b13c57ab8486153a5c00a294f4c5fd2a876ed9bd72ae650d6ed4a667998257753ca9bae50ac7522f5237918ec54798a511c1d2133c42f558e6ae13a642506758ddf2d4225d4ac2111a139324566a09c3212051a0e3a799c3c1a67039d1cd074ddecc55cc2659d8c708896901e20db27ae468fa025c9de95d168f"}, &(0x7f00000003c0), 0x1200) setresgid(0x0, 0x0, 0x0) [ 950.994814][T19788] XFS (loop3): Invalid device [.], error=-15 07:56:09 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:09 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) kcmp(0x0, r2, 0x6, r3, r0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) fdatasync(r6) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:09 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="052e67e2392029cb77f120cb168d54c486"], 0xb, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 951.282427][T19810] XFS (loop3): Invalid device [.], error=-15 07:56:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="42d209281f9bd35dec30112efc68696e5e8098253900f699ecf5e626fceb53abf1b15de6fce1a2b9d86ca609f3991109606c06eab18e521e9ba854e5c241bf88a8c4a58cb1f1ff9b95531ec8a106a517bc28a2e6292836d2000000000000000000", 0xfffffe74) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 951.381224][T19810] XFS (loop3): Invalid device [.], error=-15 07:56:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x20000000) 07:56:09 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:09 executing program 0: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x83}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) r3 = socket$alg(0x26, 0x5, 0x0) mount(&(0x7f00000000c0)=@md0='/dev/md0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)='befs\x00', 0x30d5406e9bb3a5a1, &(0x7f0000000500)='\x00') bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r8, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x7fffffff, "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", 0x33, 0x3, 0x3, 0x1, 0x14, 0x2, 0x5, 0x1}, r8}}, 0x128) r9 = accept$alg(r3, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) tee(r12, r3, 0x85, 0x1) setsockopt$CAN_RAW_LOOPBACK(r10, 0x65, 0x3, &(0x7f0000000080), 0x4) setresgid(0x0, 0x0, 0x0) [ 951.810640][T19831] XFS (loop3): Invalid device [.], error=-15 [ 951.835539][T19804] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:56:10 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x8, 0x9}) dup(0xffffffffffffffff) [ 951.937709][T19831] XFS (loop3): Invalid device [.], error=-15 07:56:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x40000000) [ 951.986321][T19804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 952.086703][T19804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 07:56:10 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 952.272224][T19807] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 952.335010][T19857] XFS (loop3): Invalid device [.], error=-15 [ 952.360399][T19807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 952.367915][T19807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 952.411451][T19857] XFS (loop3): Invalid device [.], error=-15 07:56:10 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20000, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0xc08000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:10 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x8, 0x9}) dup(0xffffffffffffffff) 07:56:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f0000000000)=""/211, 0xd3) 07:56:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x48000000) 07:56:10 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x204000) accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:10 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:10 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x8, 0x9}) dup(0xffffffffffffffff) 07:56:10 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$isdn_base(r0, &(0x7f00000000c0)={0x22, 0x80, 0x7, 0x1, 0x1}, 0x6) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 952.723695][T19878] XFS (loop3): Invalid device [.], error=-15 07:56:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fadvise64(r1, 0x7fffffff, 0x4, 0x4) dup(0xffffffffffffffff) [ 952.815061][T19878] XFS (loop3): Invalid device [.], error=-15 07:56:10 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100, 0x150000) read$alg(r0, &(0x7f00000000c0)=""/44, 0x2c) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:10 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="25e80900f1a12400", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r5, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x582, 0x8}, &(0x7f0000000180)=0x90) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:10 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4c000000) 07:56:11 executing program 0: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x210081, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) [ 953.130866][T19907] XFS (loop3): Invalid device [.], error=-15 07:56:11 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x80, 0x0, 0x80, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd, 0x5}]}, 0x30}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="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", 0xfffffffffffffe4e) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xfffb, 0x2, 0x2, 0x8000}, {0x1, 0xf9, 0x3f, 0x7f}, {0x5, 0x1f, 0x8, 0x7ff}]}) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x40}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) r5 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000140)) semctl$SETVAL(r5, 0x3, 0x10, &(0x7f0000000400)=0x6742) name_to_handle_at(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)={0xca, 0x5, "672b819ae0410663d87626d6a4c71615b57bbfc3ddd956491d9fbef38e76a83eb06105f78be63119992029a41c0fddf158c4c6eed6a7f4f7e02b3e0b6f784f895954f7a4752a3cd8b13c57ab8486153a5c00a294f4c5fd2a876ed9bd72ae650d6ed4a667998257753ca9bae50ac7522f5237918ec54798a511c1d2133c42f558e6ae13a642506758ddf2d4225d4ac2111a139324566a09c3212051a0e3a799c3c1a67039d1cd074ddecc55cc2659d8c708896901e20db27ae468fa025c9de95d168f"}, &(0x7f00000003c0), 0x1200) setresgid(0x0, 0x0, 0x0) [ 953.221351][T19907] XFS (loop3): Invalid device [.], error=-15 07:56:11 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000080)) r3 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r3, 0xffffffffffffffff) dup(0xffffffffffffffff) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x7, {0x4, 0x8, 0x72, 0x2, 0x6}}, 0xc7) setresgid(0x0, 0x0, 0x0) 07:56:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x68000000) 07:56:11 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="04b0cdc2653262c6b4723a9cbb6370f6fa595dc3c4dbf09a06eb9e36b50b7bafe2d6b050bfd41e81e7fd7a228573e05de919e0d13320fdb534fdee0e8e3ae50842f0a41dadc3965c28517c6184c034e770724a0c45fc37f71ed13c326c961568a8204c19322b90e6", 0x68, 0x8}, {&(0x7f0000000200)="b5cb2d92c94c473f53cec20ed8de20ebda73b83af8377f5ea886be7b913d596721bbf3ca06294f5a63cf4f2986ca555519ecb8e57c2902859c5b4b567f6168f760297387321edfd160c379cf5438dbfea9b9e59d9b9580986b", 0x59, 0x8}, {&(0x7f0000000600)="6a8b26618a24f4381f540800000000b4cd04c6067b8c067e448f76a3726bbd15a0f51c0e440d99597361af117055ac50d7c82d719565f04b8c8224c4d6d1486278f063b91ccf6b7f3a6f623c3d9dbf228908433be59db13e04c61b0c19a685f3441c9ae76570ed71b7f668320d9595526b448a7ee43e65767c5d384dbb7f323486e9baab997dda8f5e15968b3a4283cc7dd4000000", 0x95, 0x8001}, {&(0x7f0000000280)="ceeb0eb304eaf089b271de296a29845aeac2b50aa85ef50a28b296d1788b11d621cde99a80eb9f5f2648cc3b5dd7e9707ca8fa0112ed0703d82643c3b26de0829313065c9ab7ea80dabb05d67da264ba4802cb3cac6c7c0113ba1dc1b5c2f0038e620b796293fb800abf0f82630c67d1763c744d093938656ea49fdc8dffad3325bada2b4dcedcb3ef18829adf4cd25b71b62a85a80033e18b229fa40d88dca0126885a203bdea49d50a", 0xaa, 0x100}, {&(0x7f0000000340)="bf3382f21ee8dd353a9f26a171382b9ddb02f958594c9724a6589de59667c09f58d3d78ca4c3111f8cc7b4731d9e6f30ba9464dc70e853fab778908318f540f583ff1d497423b3032f0e1df9c01d80fa2b904e5846b888addd02a38ba0035692c1872e81cc7b5391feb33b13477f56953dbaa601ec90766d355f59a561cd37f9d85d6ee77d4fc091e898668982d8cc9408fa0e3f63a7d655f776999d9a26ea7b0a0d677950b33c81c03aed995e13a5c690189d0782edb1f0d2cc3072d2d93eb2cb4d8015e27e84e295f5436950ea570ea86e06ee6d625cb22d167207ef24cad787eee42a05046c79065b143342cdbbc26f81e0f751b3", 0xf6}], 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB='noquota,nocuota,logdev=./file0,nobarrier,pqnoenforce,nolazytime,sysvgroups,grpid,noalign,inode32,pcr=00000000000000000047,fsmagic=0x0000000000000009,dont_appraise,pcr=00000000000000000049,\x00']) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000580)) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000005c0)={0x3, 0x5}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r6) setresgid(0x0, 0x0, r6) [ 953.483386][T19934] XFS (loop3): Invalid device [.], error=-15 [ 953.670050][T19934] XFS (loop3): Invalid device [.], error=-15 07:56:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x207, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) semctl$SETALL(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt(0xffffffffffffffff, 0x9, 0x3, &(0x7f0000000880)="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", 0x1000) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f00000000c0), 0x4) r6 = dup(r2) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SIOCRSGCAUSE(r6, 0x89e0, &(0x7f0000000000)) dup(0xffffffffffffffff) 07:56:11 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101, 0x0) dup2(r2, r3) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r7, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x2f76889ebbc2b9b2}, 0x40000) dup(0xffffffffffffffff) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:ssh_exec_t:s0\x00', 0x20, 0x1) bind$bt_l2cap(r8, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 953.955688][T19925] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 953.973905][T19957] XFS (loop3): Invalid device [.], error=-15 07:56:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6c000000) [ 954.083213][T19957] XFS (loop3): Invalid device [.], error=-15 [ 954.148450][T19964] kvm [19961]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 954.191595][T19945] XFS (loop4): Invalid superblock magic number 07:56:12 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB="66642716bf4259c72234ff63973002923107c16c37d6a1b500db29e6b3bf2b944f6ba1cade5173d31cbf8d401f098267a830835dd0fa194a9d5cf9c771", @ANYRESHEX, @ANYBLOB=',rootmode=0000000@00000000004000', @ANYRESDEC=r3]) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x8, 0x4) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x101e, 0x0, 0x13, r4, 0x180000000) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2, &(0x7f00000003c0)=[{&(0x7f00000002c0)="ae18743d5d88d4989b9da096d5d04509b7baeaf6d8fe009ae999cd04f507493e7bd69c756b750a4b7e00e733c64325af9daddbeb95866338e687794bf08c9c13cf33f9063e0ce004275d42a0c782c25cbbbfcdfd9e6eee77b652da1c1e77289181d582ff5810b4a2d43e888e9a3e37ce0c24fde28e0b41cc4e3ade182e11dc093746badd34ef3184764b77aae1bfd63ca8b3d0691fa891d960388e7265565e47b4d4440454368ccf293cb5f1f1", 0xad, 0x100}, {&(0x7f0000000380)="b4c6cb3c75d1ce21f605dadd1f5e1e4dab1af74f39183fba8d5ee656fa84a95afb53171d661c038677cebb243721f167c1f63c5ffb3898b9d3430d0b1da8", 0x3e, 0x4}], 0x10082, &(0x7f00000004c0)={[{@dots='dots'}], [{@smackfsdef={'smackfsdef', 0x3d, 'lrw(aes)\x00'}}, {@euid_gt={'euid>', r3}}, {@audit='audit'}]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r2, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r7, 0xc0bc5310, &(0x7f0000000500)) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r8, 0xc018620b, &(0x7f0000000000)={0x1}) [ 954.244283][T19925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 954.273756][T19925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 07:56:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000240)="f282a1e86e6aa2a6fffa278a13f9f67b0f104e40777d52b9cb0289c5992fd6cf9db362d60a97c694028ad77b8ad7d251b43b00b266060e0a4b6c56a7c5725bff040007662787119ce063bdec282976302af6cb574cd83556c6ac1c52ea4fe461ee6f2a38abfe74b8e9bf214a41a62885db242a508bd89ed7ce9925dd3a03b962e452e5115f2187d24e23348db585cb5ff1ecd0aba90022656d7ee84059a27bf83681412f7bc016d85f4793c0d62b611073980100"/192, 0xc0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) r2 = accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x8ca99c800544428f, @hyper}, 0x10, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x100000000, 0x542, 0x8}) dup(0xffffffffffffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 954.388335][T19982] XFS (loop3): Invalid device [.], error=-15 [ 954.479600][T19927] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 954.491055][T19982] XFS (loop3): Invalid device [.], error=-15 [ 954.608520][T19927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 954.636969][T19927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 07:56:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB="66642716bf4259c72234ff63973002923107c16c37d6a1b500db29e6b3bf2b944f6ba1cade5173d31cbf8d401f098267a830835dd0fa194a9d5cf9c771", @ANYRESHEX, @ANYBLOB=',rootmode=0000000@00000000004000', @ANYRESDEC=r3]) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x8, 0x4) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x101e, 0x0, 0x13, r4, 0x180000000) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2, &(0x7f00000003c0)=[{&(0x7f00000002c0)="ae18743d5d88d4989b9da096d5d04509b7baeaf6d8fe009ae999cd04f507493e7bd69c756b750a4b7e00e733c64325af9daddbeb95866338e687794bf08c9c13cf33f9063e0ce004275d42a0c782c25cbbbfcdfd9e6eee77b652da1c1e77289181d582ff5810b4a2d43e888e9a3e37ce0c24fde28e0b41cc4e3ade182e11dc093746badd34ef3184764b77aae1bfd63ca8b3d0691fa891d960388e7265565e47b4d4440454368ccf293cb5f1f1", 0xad, 0x100}, {&(0x7f0000000380)="b4c6cb3c75d1ce21f605dadd1f5e1e4dab1af74f39183fba8d5ee656fa84a95afb53171d661c038677cebb243721f167c1f63c5ffb3898b9d3430d0b1da8", 0x3e, 0x4}], 0x10082, &(0x7f00000004c0)={[{@dots='dots'}], [{@smackfsdef={'smackfsdef', 0x3d, 'lrw(aes)\x00'}}, {@euid_gt={'euid>', r3}}, {@audit='audit'}]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r2, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r7, 0xc0bc5310, &(0x7f0000000500)) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r8, 0xc018620b, &(0x7f0000000000)={0x1}) 07:56:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x74000000) 07:56:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f00000000c0)={0x8001001, 0x80, 0x3}) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:12 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x7}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000000c0)='user\x00', &(0x7f0000000180)='#posix_acl_access\xf8em1}%keyringGPL\x00') dup(0xffffffffffffffff) 07:56:12 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000780)='/\xff\x0f\x00\x00\x82mX\x80li#\x00', 0xffffffffffffffff, 0x440001) accept4$alg(r1, 0x0, 0x0, 0x180400) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r4, 0x3b65, 0x8) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000080000000000000000000000000003000000000000000000000000000000000000000000e1ff00"/88], 0x58) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae89, &(0x7f0000000400)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080, 0x4000000000000], [0xc1]}) ioctl$FS_IOC_SETFSLABEL(r6, 0x41009432, &(0x7f0000000300)="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") dup(0xffffffffffffffff) [ 954.894783][T20007] XFS (loop3): Invalid device [.], error=-15 [ 954.996316][T20007] XFS (loop3): Invalid device [.], error=-15 07:56:13 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0x0, "706ec8c68514fe8457a469c1b10993c3e1958a24d07139f965d8dea8662b472a", 0x3, 0x10001, 0x2, 0x800, 0x60100, 0x4}) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x14002, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000340)=0x63, 0x4) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:13 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 955.121027][T20025] kvm [20022]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:56:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x80}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r3, 0xffffffffffffffff) dup(0xffffffffffffffff) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000), 0xe) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7a000000) [ 955.326521][T20037] kvm [20034]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:56:13 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="04b0cdc2653262c6b4723a9cbb6370f6fa595dc3c4dbf09a06eb9e36b50b7bafe2d6b050bfd41e81e7fd7a228573e05de919e0d13320fdb534fdee0e8e3ae50842f0a41dadc3965c28517c6184c034e770724a0c45fc37f71ed13c326c961568a8204c19322b90e6", 0x68, 0x8}, {&(0x7f0000000200)="b5cb2d92c94c473f53cec20ed8de20ebda73b83af8377f5ea886be7b913d596721bbf3ca06294f5a63cf4f2986ca555519ecb8e57c2902859c5b4b567f6168f760297387321edfd160c379cf5438dbfea9b9e59d9b9580986b", 0x59, 0x8}, {&(0x7f0000000600)="6a8b26618a24f4381f540800000000b4cd04c6067b8c067e448f76a3726bbd15a0f51c0e440d99597361af117055ac50d7c82d719565f04b8c8224c4d6d1486278f063b91ccf6b7f3a6f623c3d9dbf228908433be59db13e04c61b0c19a685f3441c9ae76570ed71b7f668320d9595526b448a7ee43e65767c5d384dbb7f323486e9baab997dda8f5e15968b3a4283cc7dd4000000", 0x95, 0x8001}, {&(0x7f0000000280)="ceeb0eb304eaf089b271de296a29845aeac2b50aa85ef50a28b296d1788b11d621cde99a80eb9f5f2648cc3b5dd7e9707ca8fa0112ed0703d82643c3b26de0829313065c9ab7ea80dabb05d67da264ba4802cb3cac6c7c0113ba1dc1b5c2f0038e620b796293fb800abf0f82630c67d1763c744d093938656ea49fdc8dffad3325bada2b4dcedcb3ef18829adf4cd25b71b62a85a80033e18b229fa40d88dca0126885a203bdea49d50a", 0xaa, 0x100}, {&(0x7f0000000340)="bf3382f21ee8dd353a9f26a171382b9ddb02f958594c9724a6589de59667c09f58d3d78ca4c3111f8cc7b4731d9e6f30ba9464dc70e853fab778908318f540f583ff1d497423b3032f0e1df9c01d80fa2b904e5846b888addd02a38ba0035692c1872e81cc7b5391feb33b13477f56953dbaa601ec90766d355f59a561cd37f9d85d6ee77d4fc091e898668982d8cc9408fa0e3f63a7d655f776999d9a26ea7b0a0d677950b33c81c03aed995e13a5c690189d0782edb1f0d2cc3072d2d93eb2cb4d8015e27e84e295f5436950ea570ea86e06ee6d625cb22d167207ef24cad787eee42a05046c79065b143342cdbbc26f81e0f751b3", 0xf6}], 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB='noquota,nocuota,logdev=./file0,nobarrier,pqnoenforce,nolazytime,sysvgroups,grpid,noalign,inode32,pcr=00000000000000000047,fsmagic=0x0000000000000009,dont_appraise,pcr=00000000000000000049,\x00']) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000580)) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000005c0)={0x3, 0x5}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r6) setresgid(0x0, 0x0, r6) 07:56:13 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x14) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 955.386393][T20042] XFS (loop3): Invalid device [.], error=-15 07:56:13 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000040)) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 955.493040][T20042] XFS (loop3): Invalid device [.], error=-15 07:56:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) pause() r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x2, 0x2) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000640)=""/176, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f0000000880)=""/4108, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0, 0xfffffffffffffdef}}], 0x3, 0x0, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x111800, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) tkill(0xffffffffffffffff, 0x2c) r6 = getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) r8 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r9) sendmsg$unix(r4, &(0x7f00000003c0)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="de40d0fb57452ab0df330e84e698d739e09f22f088f4174cf2644f45b44d6ef3088c3a6d714f817305a2777cb7ed7440c85def12a9bf2e3c1938b878d0f4158858448c1eadbe186b7ca53abf2aa5323726a95dde789d8ffa85b8524cee26c2b5fa45f7ee9618", 0x66}, {&(0x7f0000000200)="75f374c8fa8ee10df6e9828b2d5ce7d36c09dc616d3e45cf8aaad8b39061e8192ef7164549187b0c30aa067c76ebaf2cd3686dee6545f9a632e68c3447e03e45e9808e87f5a06161c35959b78bbcdbe28d0bb82632a16a0ab3720c531da4aeccb97771b30dfd3ac96b53e256e8a109948d29a2cad3f590dc", 0x78}], 0x2, &(0x7f0000000380)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r9}}}], 0x38, 0x40}, 0x80) 07:56:13 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:13 executing program 2: setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:crack_db_t:s0\x00', 0x20, 0x1) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x1901, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e000000) [ 955.811009][T20073] XFS (loop3): Invalid device [.], error=-15 07:56:14 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xa008c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000440)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000a8a000)=0x28c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x7a, &(0x7f00000001c0), &(0x7f000034f000)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) renameat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 955.908219][T20073] XFS (loop3): Invalid device [.], error=-15 07:56:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB="66642716bf4259c72234ff63973002923107c16c37d6a1b500db29e6b3bf2b944f6ba1cade5173d31cbf8d401f098267a830835dd0fa194a9d5cf9c771", @ANYRESHEX, @ANYBLOB=',rootmode=0000000@00000000004000', @ANYRESDEC=r3]) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x8, 0x4) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x101e, 0x0, 0x13, r4, 0x180000000) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2, &(0x7f00000003c0)=[{&(0x7f00000002c0)="ae18743d5d88d4989b9da096d5d04509b7baeaf6d8fe009ae999cd04f507493e7bd69c756b750a4b7e00e733c64325af9daddbeb95866338e687794bf08c9c13cf33f9063e0ce004275d42a0c782c25cbbbfcdfd9e6eee77b652da1c1e77289181d582ff5810b4a2d43e888e9a3e37ce0c24fde28e0b41cc4e3ade182e11dc093746badd34ef3184764b77aae1bfd63ca8b3d0691fa891d960388e7265565e47b4d4440454368ccf293cb5f1f1", 0xad, 0x100}, {&(0x7f0000000380)="b4c6cb3c75d1ce21f605dadd1f5e1e4dab1af74f39183fba8d5ee656fa84a95afb53171d661c038677cebb243721f167c1f63c5ffb3898b9d3430d0b1da8", 0x3e, 0x4}], 0x10082, &(0x7f00000004c0)={[{@dots='dots'}], [{@smackfsdef={'smackfsdef', 0x3d, 'lrw(aes)\x00'}}, {@euid_gt={'euid>', r3}}, {@audit='audit'}]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r2, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r7, 0xc0bc5310, &(0x7f0000000500)) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r8, 0xc018620b, &(0x7f0000000000)={0x1}) 07:56:14 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000000)=[0x1000, 0x6, 0x400]) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8001, 0x1) 07:56:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xff000000) 07:56:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x3, 0x369) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0xb35dfefce0a2b5a0) dup(0xffffffffffffffff) [ 956.251978][T20094] XFS (loop3): Invalid device [.], error=-15 [ 956.315346][T20094] XFS (loop3): Invalid device [.], error=-15 07:56:14 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:14 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200, 0x0) read$alg(r4, &(0x7f0000000280)=""/157, 0x9d) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="7c16b0d86689f447637b20a4211677", 0xffffff51) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x442300, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xff600000) 07:56:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fadvise64(r1, 0x7fffffff, 0x4, 0x4) dup(0xffffffffffffffff) [ 956.575416][T20113] XFS (loop3): Invalid device [.], error=-15 07:56:14 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x4, 0x8}, 0xc) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x15) perf_event_open(&(0x7f0000000100)={0x1, 0xfffffffffffffd52, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x207, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-neon\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e23, 0x1000, @dev={0xfe, 0x80, [], 0x29}, 0x10001}, {0xa, 0x4e21, 0x1f1d, @mcast1, 0xf4ed}, 0x2c7, [0x5, 0x9, 0x3c227ad2, 0x10000, 0x1, 0x6, 0xfff, 0x3]}, 0x5c) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0xd2, 0x0, 0x9, 0x4, 0x100}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) r8 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r8, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(r8, 0x0) r9 = shmat(r8, &(0x7f0000ffd000/0x1000)=nil, 0x0) shmdt(r9) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"/456], 0x1c8}, 0x1, 0x0, 0x0, 0x20040c0}, 0x4) dup(0xffffffffffffffff) [ 956.681030][T20113] XFS (loop3): Invalid device [.], error=-15 07:56:14 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xffffffffffff0352, 0x20000) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20, '('}], 0xa, "ea9d6744dc6589cd0c7adfd05f8d9942963164406b29e1f31059d863a67c7f4c4a56b822e8656006841acced28cd6fb56a63813397a57336d4a6dca9976dc62ff5255a7cadf6ce8d803505b1160c05f0ffa3cd96ad81f13d0d9761dcec538d7c3e9e26fc3a8911c5c76cc7f4cbee6c3aa2fb91ae542a41aa010a43a2ef1068f220d2e609b44b9dc2fa4693fb62026a961199647e409eb2e203ff87"}, 0xa8) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 956.813771][ T26] audit: type=1800 audit(1573458974.861:92): pid=20133 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=2 res=0 [ 957.041737][ T26] audit: type=1800 audit(1573458975.091:93): pid=20130 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=3 res=0 [ 957.061769][T20141] XFS (loop3): Invalid device [.], error=-15 07:56:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000000)=[0x5, 0x2, 0x37d]) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:15 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x5a, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = dup2(r0, 0xffffffffffffffff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r2, r5, 0xe}, 0x10) dup(0xffffffffffffffff) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2000000000) [ 957.126769][T20141] XFS (loop3): Invalid device [.], error=-15 07:56:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fadvise64(r1, 0x7fffffff, 0x4, 0x4) dup(0xffffffffffffffff) 07:56:15 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000180)=@llc, &(0x7f0000000200)=0x80) bind$alg(r1, 0x0, 0xcc6b02e1c51adf76) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r5 = dup2(r4, 0xffffffffffffffff) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000240)="679627e4ef08d42b93764c01637d2342b8282dc04782b71989f50c142c5ffa280a88ec61a89fcfc7026a295bb083cca826b4834cc5e85da1c3e512571a5b3efe3dcf51a7", 0x44) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:crack_db_t:s0\x00', 0x20, 0x2) 07:56:15 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7fffffff}, 0x2000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:15 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) [ 957.474211][T20167] XFS (loop3): Invalid device [.], error=-15 07:56:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000180)={0x10000000, 0x20, 0x1, 0x0, [], [], [], 0x10000, 0x1, 0x2, 0xffffff77, "aeeca63504805a41d6b07b97548c2d19"}) dup(0xffffffffffffffff) [ 957.601695][T20167] XFS (loop3): Invalid device [.], error=-15 07:56:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x400000000000) 07:56:15 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:15 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0xffffff6f) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x31, 0x4, 0x1}}, 0x14) 07:56:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000080)=0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x28) bind$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fadvise64(r1, 0x7fffffff, 0x4, 0x4) dup(0xffffffffffffffff) [ 957.942023][T20192] XFS (loop3): Invalid device [.], error=-15 07:56:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 958.067802][T20192] XFS (loop3): Invalid device [.], error=-15 07:56:16 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x70, 0x81, 0x1f, 0x9a, 0x0, 0x0, 0x9, 0x8000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x400, 0x1ff, 0x3, 0x1a, 0x2, 0x8, 0x2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r1, 0x0, 0xd, &(0x7f0000000180)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000004, 0x4000010, r4, 0x3) dup(0xffffffffffffffff) 07:56:16 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x60ffffffffff) 07:56:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="f71ca634010467be78f0988a96f1d2a01dd5fa617a34b3124801e288aca6529e7dea2d453fa98dbfe8ec641d20ce355c2d7245f546db9993f23202f2d715e8fe38ce870d5f04343bef4c46cfa8fdce620044b2d4e0bad9daba4ffe0530a35094d44bb84caf2df5f739289ab00c97bbe5ad98fbe344ce0a4dfc6f7df0f2fb9aead96f850e000000000000a8952a4519b2a42a5607fd3f74c35ce7af8029b363229ca36d582d0da3c16a883d16c5a10eea82dd6a7fcd5b8fdf48eba0de1fde0f58f59a08a9613670f0b19df270f4210407b453ed6a49bf1673714f08ed1f2067ca818185fa2ee37a4aa3", 0xe9) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x1}, 0x180) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'veth1_to_bridge\x00', 0xffe8}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x2220, 0x1, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x1aa) setresgid(0x0, 0x0, 0x0) [ 958.360405][T20220] XFS (loop3): Invalid device [.], error=-15 07:56:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x3c43, 0xc771c96f0f317bd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 958.487948][T20220] XFS (loop3): Invalid device [.], error=-15 07:56:16 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = dup(r1) prctl$PR_SET_UNALIGN(0x6, 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x28200, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) accept$alg(r4, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000180)={0x10000000, 0x20, 0x1, 0x0, [], [], [], 0x10000, 0x1, 0x2, 0xffffff77, "aeeca63504805a41d6b07b97548c2d19"}) dup(0xffffffffffffffff) 07:56:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = accept$ax25(r3, &(0x7f0000000080)={{0x3, @rose}, [@netrom, @remote, @null, @remote, @null, @null, @rose]}, &(0x7f0000000180)=0x48) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB="66642716bf4259c72234ff63973002923107c16c37d6a1b500db29e6b3bf2b944f6ba1cade5173d31cbf8d401f098267a830835dd0fa194a9d5cf9c771", @ANYRESHEX, @ANYBLOB=',rootmode=0000000@00000000004000', @ANYRESDEC=r6]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x20000, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@privport='privport'}, {@privport='privport'}, {@uname={'uname', 0x3d, '*'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r5}}, {@fsmagic={'fsmagic', 0x3d, 0x16a}}, {@euid_eq={'euid', 0x3d, r6}}, {@dont_appraise='dont_appraise'}]}}) [ 958.770278][T20245] XFS (loop3): Invalid device [.], error=-15 07:56:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x710000000000) 07:56:16 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip6_mr_cache\x00') ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="0008265de39f8ac8fa4463bd7000ffdbdf1ce1d64ef741309eece57aaeb613cc3a250300"/46], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='a\x00\x00\x00)'], 0x5) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x44600, 0x0) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000240)=0x9) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r8, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, 0x0, &(0x7f0000000040)) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000002c0)=r11, 0x4) r12 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r12, 0xffffffffffffffff) dup(0xffffffffffffffff) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r13, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 958.865795][T20245] XFS (loop3): Invalid device [.], error=-15 07:56:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000180)={0x10000000, 0x20, 0x1, 0x0, [], [], [], 0x10000, 0x1, 0x2, 0xffffff77, "aeeca63504805a41d6b07b97548c2d19"}) dup(0xffffffffffffffff) 07:56:17 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 958.975837][T20261] validate_nla: 1 callbacks suppressed [ 958.975846][T20261] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 959.054266][T20261] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:56:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0xfd4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 959.196559][T20271] XFS (loop3): Invalid device [.], error=-15 07:56:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="25e80900f1a12400", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r5, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x582, 0x8}, &(0x7f0000000180)=0x90) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x760000000000) [ 959.313092][T20271] XFS (loop3): Invalid device [.], error=-15 07:56:17 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000, 0x12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:17 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="7985eefed8dde69fe680da74672250a7d28a2b3dea352f76fe36aeffbbc1fa11130961c34e3c3edf2bb03c24e4f0793bda041289ec7621a39edc22a1bc663284cbe779a56d4035eb4add740ec5aa1c2dcccb3cd58c28969e93501758060d19bee4d1d25e54d5e373101b91288e1a722a76af8f01164f289f533b8de7053589ec1e63422289cdb94d03f6c9407cf98ca76a7822ed67763bb9ee258682", 0x9c) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r6, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r13 = accept$alg(r12, 0x0, 0x0) r14 = dup(r13) write$UHID_DESTROY(r14, &(0x7f0000000080), 0xfff2) recvmmsg(r14, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$TCSETXW(r14, 0x5435, &(0x7f00000000c0)={0x5, 0x9, [0x401, 0x3f, 0x4, 0x0, 0x9]}) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$BLKROSET(r11, 0x125d, &(0x7f0000000040)=0x43) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 959.656409][T20293] XFS (loop3): Invalid device [.], error=-15 07:56:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) sendmsg$sock(r1, &(0x7f0000001980)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x2, 0x4, 0x204, {0xa, 0x4e20, 0x0, @empty, 0x2}}}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001a80)="46f707c7accc25c8f1d117539b6d5c9294b377b79074a0", 0x17}, {&(0x7f0000000340)="9cf92ba1ca8170c7cb81b01d0f46cda61cebd1e496671c402ee00b7d23f8ea295da700f3eb1bba43568149963fe997602564c82563222c7dcb7417922f6631b15638d57b4c7a821ac49539eb5284dbb39a102ce16ac3301cb80927030f6116cb693d1c82edefad6e19dc72ce6950ce857cde21f2631c954d59990fdc7d4f4a37c12da1b9cf4c422aaade14e3d61b7a2e4defb91833bbbd960ae6a72780c9289a2b33e60e2e40c1cac49c7921c35ff9fa346b6000947f281a102ecb", 0xbb}, {&(0x7f0000000400)="1321b306b7533a39cc224e68df1ca04ab06a630f50565df832745a18c752efa21eacc5643cb7283d5c07e6de4c30adf978bfbb3781ffcc53a94efed4a44b0b528e0ef5cfc7bfea8e4e", 0x49}, {&(0x7f0000000480)="abc3e2f920b1ada38c0e67330ccb085772f553aa41357a0ecaa7357578026dc0067bd89693cc292e4e91c04df9f1979708ff4eb8f35386ff9a0638b289978a01b9139a5996a13d3f0c6efc2e14d4ae41cd62779371f4", 0x56}, {&(0x7f0000000500)="21f67b085e9e3d1bf53dddee5d9bca18c62e0986e5fe75c07337bc9b2cb6a217935805fa6570f53229f0366fbd0fce501004cde5cd6140a1d872eb8c89240fcb93d098553c51cf0c98a5578b88ab390009311a94be22ae9845397e39a36a0159eaff9cb1de8a592c5085e15f5b2b63ef5ebc408aa74ba218822dc12cdcc454980c7bf499c7c0c272786a25cb17332cd197c2c9aa9598b182", 0x98}, {&(0x7f00000005c0)="62d81a491ebae7c6d2562b76b7dddc618cebc3454f39d51911abea7af759b776e84840e24a3ec6aad17f5761c755dee46ec2c1674307558ac5353a194e2f0a91204ceb9bc46ba90644e5f52b3bddb755292b9121bf926e35ac60781fd347db2014339a68e0d7ef6cf5df555f5fdda945398edfbd8d2e8813bb373faaba3fee28064b049bbe04e1e94cdc67480cff5ccf1cc0917fc87bb58483c5da8887629022e7c5f5e54a9d8b86e7a9629a2bf45c4e9e269a50f1365600b50e4679d31cfabb23f5c5c8bceef8", 0xc7}, {&(0x7f00000006c0)="9b947d02950804b6828bf4bc0794e90b789a35aa9fd0192188cd1cbeabff6b35866086ee9ea7f07acc7e6dccc8388ba4ae67eaf34192bff64b193affd784946e3212d3453279c197437a4ab23910e1e284f6a0e527ef8340f27a998973a13b5f1cc99697a468e04c579139a836f91f2b981fb4b7f7fc903327fd1f6b45b292ac138749fb288250dc836c9b91be535443ba9a76472f45641efa58e1aa20bdfe95b724e2b641fbd1c2d62676480a", 0xad}, {&(0x7f0000000780)="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", 0xfe}, {&(0x7f0000001ac0)="ae7e9a2c294312a421643df3dc7c9060d43f01ca79eb4a6202ba5e5b8ebae0dc844135c26eebc903de3025001a9cda9e2fa57512a0eddf43257453872bfc6969cc6d7fe0ee6570d15d9777d1c9e63ca05b578b4cdd5c18e24c01d5813865242268a15f41a2f78a6c6c74c05183a8531b2e3e49be7c873f1e596d44ffebeca65aa1d725bb793725d71a5b77c23faad01ef15a7a52dd57b19035e73251b3caf188cab225639610ae50254c20fa93721ff9accd4d0bd0b1e961cded9550f863828e272d6a10a4bf6d4bda16d11c15de9693233e4a04459b6d20dbf084027c11327ef97f1f644a262d632c2f16c3d89f9120f18a6fc76e8aa3dc03456b87a2bf8b30878a364818ca46af7d706f140d71537c75bb2b44a9a5451f1c684a9fd73e46a3ac6c7e84bf570d0f", 0x10}, {&(0x7f00000008c0)="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", 0xffffffffffffff02}], 0xa}, 0x50) r3 = dup(0xffffffffffffffff) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101880, 0x0) listen(r4, 0x3fe) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f00000019c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000080)={0xb2, &(0x7f0000000180)=""/178}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_G_TUNER(r9, 0xc054561d, &(0x7f0000001a00)={0xb72f00, "df21887b2966455d201073f74afeb7a952553d706d1b8603121fcce4c7fbfeaf", 0x2, 0x800, 0x7da0, 0x5, 0x9, 0x4, 0x7, 0x9}) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r10 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x4593, 0x2) ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 959.790889][T20293] XFS (loop3): Invalid device [.], error=-15 07:56:17 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f00000004c0)={0x3, 0x1, @raw_data=[0xfff, 0x42adb450, 0x3, 0x1f, 0x6, 0xffffffe0, 0xffff8001, 0x2, 0xf8, 0xffff, 0x3, 0x70d, 0x8, 0x3, 0x20, 0x7]}) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0xf4, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in=@loopback, @in6=@mcast2, 0x4e20, 0x4321, 0x4e22, 0x2, 0x2, 0x30, 0x1a0, 0x2f, r7, r8}, {0x801, 0x1000, 0x1, 0x3, 0x145, 0x9, 0x100, 0xfffffffffffffff7}, {0x5, 0x100000000, 0x4, 0x9}, 0xfc8, 0x6e6bb8, 0x0, 0x0, 0x841d4757b570c873}, {{@in=@loopback, 0x4d3, 0x33}, 0xf6ac0e06262fe26, @in=@loopback, 0x3507, 0x1, 0x1, 0x5, 0x3d, 0x76099559, 0x4}}, 0xe8) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7f07b2f51000) 07:56:18 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x303020) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x1c, 0x33, 0x0, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0x4, 0x1}]}, 0x1c}}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r3, 0x8, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x80) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x121800}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x68, r3, 0x400, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x3, @media='udp\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x8f5eb5238d6ed6d6}, 0x4002014) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) socket(0x11, 0x1004, 0x3) dup(0xffffffffffffffff) 07:56:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x280ba9b1e16d8aba}, 0x10, 0x800) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f00000000c0)={0x2, 0x1, [0x2, 0x6, 0x7, 0x80000001, 0x40, 0x8, 0x7fffffff, 0x9]}) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 960.094410][T20316] XFS (loop3): Invalid device [.], error=-15 [ 960.206045][T20316] XFS (loop3): Invalid device [.], error=-15 07:56:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x9, 0x86000) setsockopt$llc_int(r2, 0x10c, 0x9, &(0x7f00000000c0)=0x1, 0x4) setresgid(0x0, 0x0, 0x0) 07:56:18 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f00000001c0)={0x9, 0x100000001, 0xfff, 0x6, 0x5, 0x4}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000040)=0x851, &(0x7f0000000080)=0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, &(0x7f0000000040)) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r8, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, 0x0, 0x0) r9 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x80, 0x80800) setsockopt$RDS_FREE_MR(r9, 0x114, 0x3, &(0x7f0000000180)={{0x0, 0x2}, 0x38}, 0x10) setresgid(0x0, 0x0, 0x0) 07:56:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7fffffffefff) [ 960.467024][T20343] XFS (loop3): Invalid device [.], error=-15 07:56:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20001204}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@deltaction={0x218, 0x31, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x13, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0x10, 0x1c, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}, @TCA_ACT_TAB={0x74, 0x1, [{0x10, 0x8, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x18, 0x20, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x18, 0x17, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0x18, 0x1d, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}]}, @TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xd, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x64, 0x1, [{0x10, 0x7fffffff, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x18, 0x18, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x20}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x18, 0xd, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0x18, 0xc, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x18, 0x10, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}]}, 0x218}, 0x1, 0x0, 0x0, 0xe880}, 0x800) [ 960.615314][T20343] XFS (loop3): Invalid device [.], error=-15 07:56:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) accept4$llc(r2, &(0x7f0000000080), &(0x7f00000001c0)=0x10, 0x800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r3 = semget$private(0x0, 0x207, 0x400) semctl$SETALL(r3, 0x0, 0xd, &(0x7f0000000140)) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f00000000c0)='k6\x17~0\xb7\x04\x00', &(0x7f0000000180)={'\xdb\x04\x00', 0x0}, 0x0, 0x0, r5) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r6) keyctl$instantiate_iov(0x14, r6, 0x0, 0x2d0, r4) keyctl$describe(0x6, r4, &(0x7f0000000040)=""/56, 0x38) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8, 0x4}, 0xc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) recvmsg(r5, &(0x7f0000001580)={&(0x7f0000001180)=@tipc=@id, 0x80, &(0x7f0000001500)=[{&(0x7f0000001200)=""/251, 0xfb}, {&(0x7f0000001300)=""/247, 0xf7}, {&(0x7f0000001400)=""/127, 0x7f}, {&(0x7f0000001480)=""/72, 0x48}], 0x4, &(0x7f0000001540)=""/10, 0xa}, 0x1) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000040)={r4, 0x101}) semctl$SEM_STAT(0x0, 0x3, 0x12, &(0x7f0000000180)=""/4096) dup(0xffffffffffffffff) 07:56:18 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:18 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4d5f4bc144964ab6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25882849d92da6bb, @perf_config_ext={0x1, 0x8}, 0x180, 0x1d, 0x1000080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="e099ef7e75cb8d808279e86669d80881371a29f9d7fd57ba457740b6c0c07552e63c853e9847f4ba00e617ce60901b00"/61, 0x3d) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x4, &(0x7f00000013c0)=[{&(0x7f0000000180)="5be700f570263d88aef96f1ce9226c39099ad7585ff4b5422949f9e510b6b3f52212e73d89716aee0bc55864ac2a58dcee18462f73fce8dced3f67b0d1acd8c25cad978bc7a3409543b24881a9d857dc4e76bec2b7058102cc186455139c8330cb72bfd156a18e91b9fd183ff7eeeb4a30ff85bf964bc79a32ce54e37e09139c8c0073", 0x83}, {&(0x7f0000000240)="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", 0x1000, 0x4}, {&(0x7f0000001240)="cca9ceb5f61155275e1b9450e3d41ba2e0ed0c9c46e9de70693767437b865f64cd8c0ac1f5f07ff8bbe6f96342cbf4a45d9ab0068b5d114d41498dbd0ad402f0f0229071fc97b6e8edcad3fb9a3e507644dcdc2432d37f632665573211455e91b553dafd04e74456470fd4e14f65e90bcca307a8039f74b62be707f7d5557550654d5c", 0x83, 0x80}, {&(0x7f0000001300)="013cbbca61414a805df2a850325203a05eb4ab85cc23a49a93cc3ef1bb67690cfd1cc21ec9b9ef0a18c0b0913b8cc71d2a4c38dd03622985b5a66511a6b78aee74e5d0eab7d5b2b23e9e55c642e72cc3f8db23239cf7cb8fefecacf243a2f38f78eed865eb26bcb0dd75bb33fbefe90c73a4cc618f6146b905959070c107766deb149b4f8b41ac2a67e2d415255d8e6169b289f0d41a", 0x96, 0x4}], 0x0, &(0x7f0000001440)='+-+\\\x00') ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x960000000000) 07:56:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x460080, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:19 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r6, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 961.011840][T20378] XFS (loop3): Invalid device [.], error=-15 07:56:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x40) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r8, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r8, 0x9}}, 0x10) r9 = dup(r3) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, &(0x7f0000000040)) connect$l2tp(r9, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r10, {0x2, 0x4e23, @multicast1}, 0x1, 0x2, 0x4, 0x2}}, 0x2e) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x3, 0x4) dup(0xffffffffffffffff) [ 961.114029][T20378] XFS (loop3): Invalid device [.], error=-15 07:56:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002600)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r1, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000002640)='/dev/audio\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000002680)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000004bc0)='/selinux/mls\x00', 0x0, 0x0) bind$alg(r4, &(0x7f0000004c00)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) r5 = dup(r3) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000004b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004ac0)=[{&(0x7f00000026c0)=""/218}, {&(0x7f00000027c0)=""/243}, {&(0x7f00000028c0)=""/141}, {&(0x7f00000049c0)=""/230}, {&(0x7f0000002980)=""/27}], 0x0, &(0x7f0000000400)=""/166, 0x228}, 0x4}, {{0x0, 0x0, &(0x7f0000000840), 0x4}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}], 0x3, 0x20, 0x0) getsockname$packet(r5, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000025c0)=0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r6, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/161, 0xa6}}, {{0x0, 0xd9, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xfffffffffffffd71}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}, 0x3}], 0x3, 0x2000, 0x0) r7 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) recvmsg(r7, &(0x7f0000002540)={&(0x7f0000000040)=@ax25={{0x3, @rose}, [@remote, @netrom, @remote, @bcast, @default, @netrom, @rose, @null]}, 0x80, &(0x7f0000002480)=[{&(0x7f0000000180)=""/195, 0xc3}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/170, 0xaa}, {&(0x7f0000001340)=""/158, 0x9e}, {&(0x7f0000001400)=""/90, 0x5a}, {&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x7, &(0x7f0000002500)=""/11, 0xb}, 0x40004020) r8 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r8, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:19 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 961.361627][T20386] ucma_write: process 4885 (syz-executor.4) changed security contexts after opening file descriptor, this is not allowed. [ 961.471744][T20405] XFS (loop3): Invalid device [.], error=-15 07:56:19 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r2, 0x0, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setresgid(0x0, 0x0, 0x0) 07:56:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002600)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r1, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000002640)='/dev/audio\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000002680)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000004bc0)='/selinux/mls\x00', 0x0, 0x0) bind$alg(r4, &(0x7f0000004c00)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) r5 = dup(r3) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000004b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004ac0)=[{&(0x7f00000026c0)=""/218}, {&(0x7f00000027c0)=""/243}, {&(0x7f00000028c0)=""/141}, {&(0x7f00000049c0)=""/230}, {&(0x7f0000002980)=""/27}], 0x0, &(0x7f0000000400)=""/166, 0x228}, 0x4}, {{0x0, 0x0, &(0x7f0000000840), 0x4}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}], 0x3, 0x20, 0x0) getsockname$packet(r5, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000025c0)=0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r6, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/161, 0xa6}}, {{0x0, 0xd9, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xfffffffffffffd71}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}, 0x3}], 0x3, 0x2000, 0x0) r7 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) recvmsg(r7, &(0x7f0000002540)={&(0x7f0000000040)=@ax25={{0x3, @rose}, [@remote, @netrom, @remote, @bcast, @default, @netrom, @rose, @null]}, 0x80, &(0x7f0000002480)=[{&(0x7f0000000180)=""/195, 0xc3}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/170, 0xaa}, {&(0x7f0000001340)=""/158, 0x9e}, {&(0x7f0000001400)=""/90, 0x5a}, {&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x7, &(0x7f0000002500)=""/11, 0xb}, 0x40004020) r8 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r8, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 07:56:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x10510000000000) [ 961.597677][T20405] XFS (loop3): Invalid device [.], error=-15 07:56:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x80, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f0000000180)={{0xf000, 0xf000, 0x9, 0x2a, 0x6, 0xc1, 0x9, 0x3, 0x9, 0x0, 0x0, 0x6}, {0x1000, 0x0, 0x9, 0x7, 0xfd, 0x7, 0x8, 0x8, 0x81, 0x9, 0xf9, 0x3}, {0x0, 0x20004, 0x9, 0x9, 0x4, 0x2, 0x81, 0x1, 0x1, 0x1, 0x20, 0xff}, {0x2, 0xf000, 0x1c, 0x1, 0x6, 0x1, 0x8, 0x40, 0xfe, 0x2, 0x1, 0x9}, {0x2, 0x600a, 0xf, 0x80, 0x3f, 0x4, 0x7f, 0x2, 0x0, 0x6, 0xe, 0xc2}, {0x100000, 0x100000, 0xa, 0x5, 0x1, 0xa8, 0x63, 0x80, 0x9, 0x16, 0x80, 0x1}, {0x0, 0x0, 0x9, 0x3, 0x40, 0x8, 0x1, 0x3, 0x80, 0x4, 0x7, 0x3}, {0x1, 0x0, 0xf, 0x5, 0x5, 0x8, 0x0, 0x1, 0x1f, 0x7, 0x4, 0x78}, {0x1}, {0x8000, 0x4000}, 0x5000a, 0x0, 0xace980bea043876d, 0x200, 0xe, 0x4b1af716a388b79a, 0x2000, [0x2, 0x2, 0x8, 0x101]}) setresgid(0x0, 0x0, 0x0) 07:56:19 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x40) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r8, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r8, 0x9}}, 0x10) r9 = dup(r3) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, &(0x7f0000000040)) connect$l2tp(r9, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r10, {0x2, 0x4e23, @multicast1}, 0x1, 0x2, 0x4, 0x2}}, 0x2e) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x3, 0x4) dup(0xffffffffffffffff) [ 961.890080][T20432] XFS (loop3): Invalid device [.], error=-15 07:56:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002600)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r1, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000002640)='/dev/audio\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000002680)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000004bc0)='/selinux/mls\x00', 0x0, 0x0) bind$alg(r4, &(0x7f0000004c00)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) r5 = dup(r3) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000004b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004ac0)=[{&(0x7f00000026c0)=""/218}, {&(0x7f00000027c0)=""/243}, {&(0x7f00000028c0)=""/141}, {&(0x7f00000049c0)=""/230}, {&(0x7f0000002980)=""/27}], 0x0, &(0x7f0000000400)=""/166, 0x228}, 0x4}, {{0x0, 0x0, &(0x7f0000000840), 0x4}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}], 0x3, 0x20, 0x0) getsockname$packet(r5, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000025c0)=0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r6, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/161, 0xa6}}, {{0x0, 0xd9, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xfffffffffffffd71}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}, 0x3}], 0x3, 0x2000, 0x0) r7 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) recvmsg(r7, &(0x7f0000002540)={&(0x7f0000000040)=@ax25={{0x3, @rose}, [@remote, @netrom, @remote, @bcast, @default, @netrom, @rose, @null]}, 0x80, &(0x7f0000002480)=[{&(0x7f0000000180)=""/195, 0xc3}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/170, 0xaa}, {&(0x7f0000001340)=""/158, 0x9e}, {&(0x7f0000001400)=""/90, 0x5a}, {&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x7, &(0x7f0000002500)=""/11, 0xb}, 0x40004020) r8 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r8, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) [ 961.996115][T20432] XFS (loop3): Invalid device [.], error=-15 07:56:20 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xff', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:20 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x309) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x211c0, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000180)={0xc5, 0x10, &(0x7f00000003c0)="314bb2016a6c39d7048158fd9c665cf70ffa62752226ef8ce1", {0x0, 0x2, 0x30383653, 0x0, 0x0, 0x831, 0x1e64ea5b297e2159, 0xffffff19}}) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r2, 0xf9, 0x38}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'vmac64(cast6-generic)\x00'}}, &(0x7f0000000280)="fe7c9bf48d0ac50599c67d2b71827e897e1906131c9d1d37fb9d4ff309b80f7b2ced2b658899f79399e1240c5726d4e6e85bd562cd647e6b81ec675c73f5785e006acae18a8968d9871ce5f7b7ca6c5352a0ef66e687f2cee6b00aad487bbc7bd8f8a9d16b29c6fb414f8f1f9f47796e314cac3397a5ba1516eda7715e7e5812b760296e3c72ac5918b7ff4bd09d26ff1e8ee57b044c0628ffbf2f734955a4b0f72a75b051a12ac487ee1feb22f94bbfb663da9930dd8276c943819f8fbe616beb1af15e3268f8d4419b110a545b0e885180fd275df9dec08965d8e27f199d4a6a275e4d7fa8315fb9c224c0a733c1db6bb572d639a1f3fb5f", &(0x7f0000000380)=""/56) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x4}, 0xe) setresgid(0x0, 0x0, 0x0) 07:56:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x10f5b2077f0000) 07:56:20 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x69008497a0c4849b, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x40) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r8, 0x0, 0x3, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r8, 0x9}}, 0x10) r9 = dup(r3) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, &(0x7f0000000040)) connect$l2tp(r9, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r10, {0x2, 0x4e23, @multicast1}, 0x1, 0x2, 0x4, 0x2}}, 0x2e) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x3, 0x4) dup(0xffffffffffffffff) 07:56:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x9, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x10) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000880)={0xfffffffd, {{0x2, 0x4e20, @multicast2}}, 0x0, 0x4, [{{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e21, @loopback}}]}, 0x290) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1a) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}, 0x80000}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r5, 0xc05c5340, &(0x7f00000000c0)={0x4, 0x3, 0x9, {0x0, 0x989680}, 0x38753a, 0x20}) setresgid(0x0, 0x0, 0x0) 07:56:20 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:20 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'tunl0\x00', 0x9}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) r8 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r9) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000380)=0xc) write$P9_RSTATu(r6, &(0x7f00000004c0)={0x6b, 0x7d, 0x2, {{0x0, 0x4d, 0x7f, 0x5, {0x10, 0x0, 0x1}, 0x80000, 0x5, 0x5, 0xfffffffffffffff5, 0x0, '', 0x8, '!vmnet0\x00', 0x9, 'nodev-+{\'', 0x9, 'lrw(aes)\x00'}, 0x9, 'lrw(aes)\x00', r7, r9, r11}}, 0x6b) r12 = accept$alg(r3, 0x0, 0x0) r13 = dup(r12) write$UHID_DESTROY(r13, &(0x7f0000000080), 0xfff2) recvmmsg(r13, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0, 0x1a5}}], 0x3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r13, 0x84, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) 07:56:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x309) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x211c0, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000180)={0xc5, 0x10, &(0x7f00000003c0)="314bb2016a6c39d7048158fd9c665cf70ffa62752226ef8ce1", {0x0, 0x2, 0x30383653, 0x0, 0x0, 0x831, 0x1e64ea5b297e2159, 0xffffff19}}) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r2, 0xf9, 0x38}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'vmac64(cast6-generic)\x00'}}, &(0x7f0000000280)="fe7c9bf48d0ac50599c67d2b71827e897e1906131c9d1d37fb9d4ff309b80f7b2ced2b658899f79399e1240c5726d4e6e85bd562cd647e6b81ec675c73f5785e006acae18a8968d9871ce5f7b7ca6c5352a0ef66e687f2cee6b00aad487bbc7bd8f8a9d16b29c6fb414f8f1f9f47796e314cac3397a5ba1516eda7715e7e5812b760296e3c72ac5918b7ff4bd09d26ff1e8ee57b044c0628ffbf2f734955a4b0f72a75b051a12ac487ee1feb22f94bbfb663da9930dd8276c943819f8fbe616beb1af15e3268f8d4419b110a545b0e885180fd275df9dec08965d8e27f199d4a6a275e4d7fa8315fb9c224c0a733c1db6bb572d639a1f3fb5f", &(0x7f0000000380)=""/56) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x4}, 0xe) setresgid(0x0, 0x0, 0x0) 07:56:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x20000000000000) [ 962.784887][T20492] XFS (loop3): Invalid device [.], error=-15 07:56:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000080)={{0x0, 0x0, @reserved="00ddc2afd4997f9374a898d622ffae1ea3094fbde991fdcb3f551e5c991ad70a"}}) setresgid(0x0, 0x0, 0x0) 07:56:20 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000040)=0xc7, 0x8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r5, 0x40045201, &(0x7f0000000080)=0x3f) setresgid(0x0, 0x0, 0x0) 07:56:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:21 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:21 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x90710000000000) [ 963.118754][T20514] FAULT_INJECTION: forcing a failure. [ 963.118754][T20514] name failslab, interval 1, probability 0, space 0, times 0 [ 963.148993][T20514] CPU: 1 PID: 20514 Comm: syz-executor.2 Not tainted 5.4.0-rc6+ #0 [ 963.156955][T20514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.167031][T20514] Call Trace: [ 963.170320][T20514] dump_stack+0x197/0x210 [ 963.174664][T20514] should_fail.cold+0xa/0x15 [ 963.179251][T20514] ? fault_create_debugfs_attr+0x180/0x180 [ 963.185131][T20514] ? ___might_sleep+0x163/0x2c0 [ 963.189983][T20514] __should_failslab+0x121/0x190 [ 963.195005][T20514] should_failslab+0x9/0x14 [ 963.199498][T20514] __kmalloc+0x2e0/0x770 [ 963.203775][T20514] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 963.210005][T20514] ? fput_many+0x12c/0x1a0 [ 963.214414][T20514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 963.220635][T20514] ? strnlen_user+0x1ed/0x2e0 [ 963.225295][T20514] ? __x64_sys_memfd_create+0x13c/0x470 [ 963.230853][T20514] __x64_sys_memfd_create+0x13c/0x470 [ 963.236224][T20514] ? memfd_fcntl+0x18c0/0x18c0 [ 963.240987][T20514] ? do_syscall_64+0x26/0x760 [ 963.245665][T20514] ? lockdep_hardirqs_on+0x421/0x5e0 [ 963.250948][T20514] ? trace_hardirqs_on+0x67/0x240 [ 963.255968][T20514] do_syscall_64+0xfa/0x760 [ 963.260468][T20514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.266545][T20514] RIP: 0033:0x45a219 [ 963.270436][T20514] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 963.290124][T20514] RSP: 002b:00007fbfac30ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 963.298528][T20514] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 963.306569][T20514] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 963.314634][T20514] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 963.322608][T20514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbfac30c6d4 [ 963.330562][T20514] R13: 00000000004c9bd3 R14: 00000000004e18f0 R15: 0000000000000003 [ 963.372340][T20520] XFS (loop3): Invalid device [.], error=-15 07:56:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="3c282adef5815d87aa21087dbd8c637eaec6eec8cd37972333b9d769208b387b0aa05e2d8253a1868450ed33d66128f3b28250247fdfdf1e2ce3371268d6811349621c8f3a4ee3cbafa3e274c8d20400000000000000560d277bcaa7b8af999f8df25c60097f9e79ec6c13c5b6308845053e9a3641fec2936f26a8f3b2c00fff80ebec6eab09af", 0xf6) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setfsgid(r3) 07:56:21 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:21 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x6) [ 963.524915][T20520] XFS (loop3): Invalid device [.], error=-15 07:56:21 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 963.648818][T20532] FAULT_INJECTION: forcing a failure. [ 963.648818][T20532] name failslab, interval 1, probability 0, space 0, times 0 [ 963.670329][T20535] FAULT_INJECTION: forcing a failure. [ 963.670329][T20535] name failslab, interval 1, probability 0, space 0, times 0 [ 963.697991][T20532] CPU: 1 PID: 20532 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 963.706018][T20532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.716127][T20532] Call Trace: [ 963.719436][T20532] dump_stack+0x197/0x210 [ 963.723787][T20532] should_fail.cold+0xa/0x15 [ 963.728403][T20532] ? fault_create_debugfs_attr+0x180/0x180 [ 963.734242][T20532] ? ___might_sleep+0x163/0x2c0 [ 963.739109][T20532] __should_failslab+0x121/0x190 [ 963.744497][T20532] should_failslab+0x9/0x14 [ 963.749026][T20532] __kmalloc+0x2e0/0x770 [ 963.753266][T20532] ? mark_held_locks+0xf0/0xf0 [ 963.758019][T20532] ? _parse_integer+0x190/0x190 [ 963.762862][T20532] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 963.768574][T20532] tomoyo_realpath_from_path+0xcd/0x7b0 [ 963.774109][T20532] ? tomoyo_path_number_perm+0x193/0x520 [ 963.779753][T20532] tomoyo_path_number_perm+0x1dd/0x520 [ 963.785220][T20532] ? tomoyo_path_number_perm+0x193/0x520 [ 963.790869][T20532] ? tomoyo_execute_permission+0x4a0/0x4a0 07:56:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='statm\x00') setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x8000000000000000, 0x4) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2}, 0x2, 0x3}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 963.796668][T20532] ? __f_unlock_pos+0x19/0x20 [ 963.801346][T20532] ? ___might_sleep+0x163/0x2c0 [ 963.806200][T20532] ? selinux_file_mprotect+0x620/0x620 [ 963.811662][T20532] ? __fget+0x384/0x560 [ 963.815825][T20532] ? ksys_dup3+0x3e0/0x3e0 [ 963.820252][T20532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 963.826768][T20532] ? fput_many+0x12c/0x1a0 [ 963.831206][T20532] tomoyo_file_ioctl+0x23/0x30 [ 963.836005][T20532] security_file_ioctl+0x77/0xc0 [ 963.840960][T20532] ksys_ioctl+0x57/0xd0 [ 963.845134][T20532] __x64_sys_ioctl+0x73/0xb0 [ 963.850162][T20532] do_syscall_64+0xfa/0x760 [ 963.850195][T20532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.850206][T20532] RIP: 0033:0x45a219 [ 963.850219][T20532] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 963.850231][T20532] RSP: 002b:00007f63808b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:56:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x100000000000000) [ 963.884086][T20532] RAX: ffffffffffffffda RBX: 00007f63808b1c90 RCX: 000000000045a219 [ 963.884096][T20532] RDX: 0000000000000006 RSI: 000000000000ae03 RDI: 0000000000000003 [ 963.884104][T20532] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 963.884113][T20532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63808b26d4 [ 963.884122][T20532] R13: 00000000004c33f7 R14: 00000000004d7678 R15: 0000000000000004 [ 963.912847][T20532] ERROR: Out of memory at tomoyo_realpath_from_path. [ 963.921939][T20535] CPU: 0 PID: 20535 Comm: syz-executor.2 Not tainted 5.4.0-rc6+ #0 [ 963.948110][T20535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.958174][T20535] Call Trace: [ 963.961508][T20535] dump_stack+0x197/0x210 [ 963.965877][T20535] should_fail.cold+0xa/0x15 [ 963.970489][T20535] ? fault_create_debugfs_attr+0x180/0x180 [ 963.976320][T20535] ? ___might_sleep+0x163/0x2c0 [ 963.981197][T20535] __should_failslab+0x121/0x190 [ 963.986175][T20535] ? shmem_destroy_inode+0x80/0x80 [ 963.991295][T20535] should_failslab+0x9/0x14 [ 963.995819][T20535] kmem_cache_alloc+0x2aa/0x710 [ 964.000684][T20535] ? __alloc_fd+0x487/0x620 [ 964.005184][T20535] ? shmem_destroy_inode+0x80/0x80 [ 964.010283][T20535] shmem_alloc_inode+0x1c/0x50 [ 964.015031][T20535] alloc_inode+0x68/0x1e0 [ 964.019472][T20535] new_inode_pseudo+0x19/0xf0 [ 964.024144][T20535] new_inode+0x1f/0x40 [ 964.028210][T20535] shmem_get_inode+0x84/0x7e0 [ 964.032912][T20535] __shmem_file_setup.part.0+0x7e/0x2b0 [ 964.038471][T20535] shmem_file_setup+0x66/0x90 [ 964.043146][T20535] __x64_sys_memfd_create+0x2a2/0x470 [ 964.048507][T20535] ? memfd_fcntl+0x18c0/0x18c0 [ 964.053333][T20535] ? do_syscall_64+0x26/0x760 [ 964.058020][T20535] ? lockdep_hardirqs_on+0x421/0x5e0 [ 964.063318][T20535] ? trace_hardirqs_on+0x67/0x240 [ 964.068335][T20535] do_syscall_64+0xfa/0x760 [ 964.072827][T20535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.078700][T20535] RIP: 0033:0x45a219 07:56:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000180)={0xcb7, 0x8, 0xffffff46, 0x86fe, 0x800}) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) r4 = socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f00000000c0)=0x5, 0x2) setresgid(0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r7, 0x5, 0x0, 0x0) [ 964.082592][T20535] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.102176][T20535] RSP: 002b:00007fbfac30ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 964.110571][T20535] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 964.118535][T20535] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 964.126616][T20535] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 964.134589][T20535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbfac30c6d4 [ 964.142560][T20535] R13: 00000000004c9bd3 R14: 00000000004e18f0 R15: 0000000000000003 [ 964.191391][T20538] XFS (loop3): Invalid device [.], error=-15 07:56:22 executing program 0 (fault-call:1 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x6) [ 964.268469][T20538] XFS (loop3): Invalid device [.], error=-15 07:56:22 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 964.391744][T20560] FAULT_INJECTION: forcing a failure. [ 964.391744][T20560] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 964.404995][T20560] CPU: 1 PID: 20560 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 964.412888][T20560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.422933][T20560] Call Trace: [ 964.426216][T20560] dump_stack+0x197/0x210 [ 964.430540][T20560] should_fail.cold+0xa/0x15 [ 964.435118][T20560] ? fault_create_debugfs_attr+0x180/0x180 [ 964.440911][T20560] ? __kasan_check_read+0x11/0x20 [ 964.445930][T20560] should_fail_alloc_page+0x50/0x60 [ 964.451111][T20560] __alloc_pages_nodemask+0x1a1/0x900 [ 964.456517][T20560] ? avc_has_extended_perms+0x8e4/0x1100 [ 964.462145][T20560] ? __alloc_pages_slowpath+0x2920/0x2920 [ 964.467857][T20560] ? __kasan_check_read+0x11/0x20 [ 964.472876][T20560] ? fault_create_debugfs_attr+0x180/0x180 [ 964.478667][T20560] cache_grow_begin+0x90/0xd20 [ 964.483420][T20560] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 964.489124][T20560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 964.495363][T20560] __kmalloc+0x6b2/0x770 [ 964.499603][T20560] ? mark_held_locks+0xf0/0xf0 [ 964.504356][T20560] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 964.510073][T20560] tomoyo_realpath_from_path+0xcd/0x7b0 [ 964.515600][T20560] ? tomoyo_path_number_perm+0x193/0x520 [ 964.521221][T20560] tomoyo_path_number_perm+0x1dd/0x520 [ 964.526660][T20560] ? tomoyo_path_number_perm+0x193/0x520 [ 964.532293][T20560] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 964.538081][T20560] ? __f_unlock_pos+0x19/0x20 [ 964.542746][T20560] ? ___might_sleep+0x163/0x2c0 [ 964.547593][T20560] ? selinux_file_mprotect+0x620/0x620 [ 964.553033][T20560] ? __fget+0x384/0x560 [ 964.557173][T20560] ? ksys_dup3+0x3e0/0x3e0 [ 964.561573][T20560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 964.567823][T20560] ? fput_many+0x12c/0x1a0 [ 964.572240][T20560] tomoyo_file_ioctl+0x23/0x30 [ 964.577003][T20560] security_file_ioctl+0x77/0xc0 [ 964.581937][T20560] ksys_ioctl+0x57/0xd0 [ 964.586083][T20560] __x64_sys_ioctl+0x73/0xb0 [ 964.590666][T20560] do_syscall_64+0xfa/0x760 [ 964.595158][T20560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.601044][T20560] RIP: 0033:0x45a219 [ 964.604924][T20560] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.624509][T20560] RSP: 002b:00007f63808b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 964.632940][T20560] RAX: ffffffffffffffda RBX: 00007f63808b1c90 RCX: 000000000045a219 07:56:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000180)={0x7fff0000, 0x800, 0x4, 0x80, 0x4, 0x4}) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x2280, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80080}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x11c, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x40481}, 0x4008010) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x8000) [ 964.640908][T20560] RDX: 0000000000000006 RSI: 000000000000ae03 RDI: 0000000000000003 [ 964.648887][T20560] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 964.657109][T20560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63808b26d4 [ 964.665286][T20560] R13: 00000000004c33f7 R14: 00000000004d7678 R15: 0000000000000004 07:56:22 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 964.730101][T20563] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 07:56:22 executing program 0 (fault-call:1 fault-nth:2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x6) 07:56:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x200000000000000) [ 964.871401][T20569] XFS (loop3): Invalid device [.], error=-15 [ 964.929260][T20569] XFS (loop3): Invalid device [.], error=-15 [ 964.935399][T20578] FAULT_INJECTION: forcing a failure. [ 964.935399][T20578] name failslab, interval 1, probability 0, space 0, times 0 [ 964.996226][T20578] CPU: 1 PID: 20578 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 965.004175][T20578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.014257][T20578] Call Trace: [ 965.017559][T20578] dump_stack+0x197/0x210 [ 965.022012][T20578] should_fail.cold+0xa/0x15 [ 965.026611][T20578] ? fault_create_debugfs_attr+0x180/0x180 [ 965.032427][T20578] ? ___might_sleep+0x163/0x2c0 [ 965.037269][T20578] __should_failslab+0x121/0x190 [ 965.042213][T20578] should_failslab+0x9/0x14 [ 965.046698][T20578] __kmalloc+0x2e0/0x770 [ 965.050940][T20578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 965.057199][T20578] ? d_absolute_path+0x11b/0x170 [ 965.062141][T20578] ? __d_path+0x140/0x140 [ 965.066473][T20578] ? tomoyo_encode2.part.0+0xf5/0x400 [ 965.071834][T20578] tomoyo_encode2.part.0+0xf5/0x400 [ 965.077032][T20578] tomoyo_encode+0x2b/0x50 [ 965.081453][T20578] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 965.087089][T20578] tomoyo_path_number_perm+0x1dd/0x520 [ 965.092564][T20578] ? tomoyo_path_number_perm+0x193/0x520 [ 965.098200][T20578] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 965.104017][T20578] ? __f_unlock_pos+0x19/0x20 [ 965.108713][T20578] ? ___might_sleep+0x163/0x2c0 [ 965.113574][T20578] ? selinux_file_mprotect+0x620/0x620 [ 965.119042][T20578] ? __fget+0x384/0x560 [ 965.123196][T20578] ? ksys_dup3+0x3e0/0x3e0 [ 965.127793][T20578] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 965.134040][T20578] ? fput_many+0x12c/0x1a0 [ 965.138476][T20578] tomoyo_file_ioctl+0x23/0x30 [ 965.143238][T20578] security_file_ioctl+0x77/0xc0 [ 965.148178][T20578] ksys_ioctl+0x57/0xd0 [ 965.152341][T20578] __x64_sys_ioctl+0x73/0xb0 [ 965.156923][T20578] do_syscall_64+0xfa/0x760 [ 965.161426][T20578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.167310][T20578] RIP: 0033:0x45a219 [ 965.171200][T20578] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 965.190785][T20578] RSP: 002b:00007f63808b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 965.199190][T20578] RAX: ffffffffffffffda RBX: 00007f63808b1c90 RCX: 000000000045a219 [ 965.207254][T20578] RDX: 0000000000000006 RSI: 000000000000ae03 RDI: 0000000000000003 [ 965.215215][T20578] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 965.223172][T20578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63808b26d4 [ 965.231124][T20578] R13: 00000000004c33f7 R14: 00000000004d7678 R15: 0000000000000004 07:56:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x18c) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0xffffffffffffff94) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x1, 0x6, 0x1f, 0x9, 0x80, 0x8}}, 0x8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup(r1) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000), 0xe) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r10, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0xd0, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/151, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r7, 0x6430) setresgid(0x0, 0x0, r4) setresgid(0x0, 0x0, r4) 07:56:23 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 965.274577][T20578] ERROR: Out of memory at tomoyo_realpath_from_path. 07:56:23 executing program 0 (fault-call:1 fault-nth:3): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x6) 07:56:23 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='x%s\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x6) [ 965.472837][T20595] XFS (loop3): Invalid device [.], error=-15 07:56:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001b0000000000000004000000090000000000000000000000fdffffffffffffff0900000000000000ffffff7f0000000000000000000000000000000000000000000000000000000000000000030000000300000000000000010400000000000017c30000000000000800"/448]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1a3, 0x10, &(0x7f0000000000), 0x1dd}, 0x2f) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x800, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r10}]]}}}]}, 0x4c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r10}) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r12 = accept$alg(r11, 0x0, 0x0) r13 = dup(r12) write$UHID_DESTROY(r13, &(0x7f0000000080), 0xfff2) recvmmsg(r13, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0xe, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @generic={0x0, 0x8, 0x7, 0x800, 0x80000001}, @alu={0x7, 0x0, 0x2, 0x1, 0x1, 0x3c, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x2, 0x4, 0x3, 0x1000, 0xc90e}, @call={0x85, 0x0, 0x0, 0x43}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @generic={0xfe, 0x6, 0x6, 0x32a, 0x8}, @generic={0x3, 0x2, 0xb, 0x9, 0x6}]}, &(0x7f0000000580)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000640)=""/207, 0x40f00, 0x2, [], r10, 0x8, r13, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x2, 0x6, 0x80000001}, 0x10}, 0x70) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x1000, &(0x7f0000000880)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e24,dfltgid=', @ANYRESHEX=r5, @ANYBLOB="2c736d61636b66736465663d2d2c6f626a5f747970653d47002c0048d0478d316d2b7cd56b15f5646e82da5a592f4476dcb34018cebe990de177c50ae4c63f94578fd7d44744d175833a3e8c05657afae5a50381624c946342d915ca5f0b0b7c7d97bfc6a69fe89daa2a6e90488585dceafbd826d38eb9e17ed8d75ff1992749c25129e4a5098abc5ce6f5d9a815"]) setresgid(0x0, 0x0, 0x0) [ 965.540460][T20595] XFS (loop3): Invalid device [.], error=-15 07:56:23 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:23 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='x\\s\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x2, 0x6) 07:56:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="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", 0xb27fa94344437560) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) dup2(r0, 0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x300000000000000) 07:56:23 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf#\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 965.831891][T20615] XFS (loop3): Invalid device [.], error=-15 [ 965.845898][T20609] netlink: 'syz-executor.4': attribute type 13 has an invalid length. 07:56:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x10, 0x6) [ 965.960546][T20615] XFS (loop3): Invalid device [.], error=-15 [ 965.979226][T20614] netlink: 'syz-executor.4': attribute type 13 has an invalid length. 07:56:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x20000000000, 0x400800) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup2(r1, 0xffffffffffffffff) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {0xfc}}, 0xe) setresgid(0x0, 0x0, 0x0) 07:56:24 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:24 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf%\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r3) r4 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000180)) setresgid(0x0, 0x0, r3) 07:56:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x400000000000000) 07:56:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4b47, 0x6) [ 966.244333][T20640] XFS (loop3): Invalid device [.], error=-15 07:56:24 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf*\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 966.350709][T20640] XFS (loop3): Invalid device [.], error=-15 07:56:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4b49, 0x6) 07:56:24 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:24 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf+\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0x1bd) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4b4e, 0x6) [ 966.662229][T20661] XFS (loop3): Invalid device [.], error=-15 07:56:24 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf-\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x500000000000000) 07:56:24 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r2 = dup2(r1, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x400) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="3904000a00"/14], 0x14}}, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x58, r4, 0x202, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffd}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffb}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x24000081) dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000240)='/dev/capi20\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000280)=0x40) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) [ 966.814738][T20661] XFS (loop3): Invalid device [.], error=-15 07:56:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f0000000040)=0x8e98) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x5, {0xff, 0xff, 0x85, 0x20, 0x1, 0x80}, 0x3ff, 0x4}, 0xe) 07:56:25 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:25 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf.\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4c00, 0x6) [ 967.135153][T20696] XFS (loop3): Invalid device [.], error=-15 07:56:25 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x600000000000000) 07:56:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4c01, 0x6) 07:56:25 executing program 1: r0 = getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x787a4fa441763788, @perf_bp={0x0}, 0x0, 0x0, 0x80}, r0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0xffffffffffffff9f) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r7, 0x40047438, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) dup2(r1, r8) dup(0xffffffffffffffff) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0xffffffffffffff47) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r11 = accept$alg(r10, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r12, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r7, 0x40086425, &(0x7f0000000240)={r13, 0x1}) bind$bt_l2cap(r9, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:25 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 967.257383][T20696] XFS (loop3): Invalid device [.], error=-15 [ 967.376364][T20709] kvm [20706]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:56:25 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:25 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfX\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x540b, 0x6) [ 967.582793][T20725] XFS (loop3): Invalid device [.], error=-15 07:56:25 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf\\\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:25 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) accept4$ax25(r4, &(0x7f0000000040)={{0x3, @rose}, [@rose, @remote, @default, @null, @rose, @null, @default]}, &(0x7f00000000c0)=0x48, 0x17e3ec505ad2c6c9) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'trusted.', 'lrw(aes)\x00'}, &(0x7f0000000280)='lrw(aes)\x00', 0x9, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendto$inet(r5, &(0x7f00000002c0)="4288248d66a3e444661c01f4f32bcdb350edec5b31e34db0f250dd6c780067464a35867197d978fc63754daf7eeb8dd1d4cc29285e966b09", 0x38, 0x8, 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$KVM_SET_FPU(r8, 0x41a0ae8d, &(0x7f0000000640)={[], 0x0, 0x3f, 0x2, 0x0, 0x9, 0x10000, 0x11000, [], 0x1}) 07:56:25 executing program 1: r0 = add_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="2265e0c15dcf64c1aa62ddf8114fac85539447133822f587dc2429367c2cb13e37b59747ecbbce623b5bdea17c72ca4a066dd7107155bb35f79110acdb69c37bd2f405d6c67f9220c28c782e59b7dcb0641d3c9e1ca335445f191331ecfcbf1fc45d73b5fa3098f2180959cb346c59230ae1c567699423edf376bbdcb40ff99dc22836919118b7c1c710c260e60472ac281a386e0ef732fab0cb90d082880c1f7ebe57edfb9ddf433bf5173134", 0xad, 0xfffffffffffffff9) keyctl$read(0xb, r0, &(0x7f0000000640)=""/210, 0xd2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r2 = dup2(r1, 0xffffffffffffffff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x42000020}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3848805d", @ANYRES16=r6, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x40000}, 0x10) dup(0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x0, 0x17, 0x6, 0x2, 0xdf, 0x6cd1, &(0x7f0000000180)="2fe956eaac52a92bf7ab7edb122c59d95390aaee878060ab1e0c958fd58649d49e159c31770433bfacab0332c9ea1e9e56aae05a50ea6278bf60c4b2f40f3ddd7e30804ef2f9813f9f789846041fcb000604c05ca049334b41a94a2ab0f8625db4f6e18af7434fb92ce4e07b76355e2916bd4a114ee11e8ab24919ab1d817ad19d3a5a0abb2c72bd67f1aa1988dc8c2f95d0c0df3c02def8776a4fd3ab395837744d1988edb632ee2149ddbfb745910e9c77100aeb1a7f177367478b456a7cc1fc24681240ff5fe722be5c80a02b0c82e8daf07b2e40e367be93e934032e54"}) fcntl$getown(r1, 0x9) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x541b, 0x6) 07:56:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x700000000000000) [ 967.680653][T20725] XFS (loop3): Invalid device [.], error=-15 07:56:25 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfc\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:25 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5421, 0x6) 07:56:26 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfd\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 968.074346][T20753] XFS (loop3): Invalid device [.], error=-15 07:56:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) dup2(r0, 0xffffffffffffffff) dup(0xffffffffffffffff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) epoll_create(0x2) 07:56:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x800000000000000) [ 968.172745][T20753] XFS (loop3): Invalid device [.], error=-15 07:56:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5423, 0x6) 07:56:26 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 968.440618][T20776] XFS (loop3): Invalid device [.], error=-15 07:56:26 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$capi20(r4, &(0x7f0000000040)={0x10, 0xe40, 0x41, 0x83, 0x3, 0x80000000}, 0x10) 07:56:26 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfi\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5437, 0x6) 07:56:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000) 07:56:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)="da7420e99997e6edb517f7e385b9783554554cc2d9e7da292dc26f6b02e70257634631e6e1a5476fc415cf8bbbedf5d223c48b258ccd7ce1b0dea8e0ac6510ec1ef8544f95de1d0344d967af9a4712766e97d6fc3bebec426bb120391a5bdd1945426e0d78484672da0357df2a3196096a59102ba15585a32d559a44809a4248d8d7ad55fbe4061ec219334ef0bdbdb13b1d61aff9ea2f67dd143b720566c5d71c3b0206371da9b94c5747275be724", 0xaf, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$describe(0x6, r0, &(0x7f0000000240)=""/191, 0x3c) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x2) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r8, 0x6, &(0x7f0000000540)={0x5fc59303, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x1) r9 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="01000000c2423a9a0d8023caa401218809adccc7fd46a965160992788077ac2058", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x7a, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r10}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000640)=ANY=[@ANYRES32=r10, @ANYBLOB="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"], &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000880)=ANY=[@ANYRES32=r10, @ANYBLOB="9e000000f16b6cd6a683de6d1386ddde30892a2e2134b921a42cb1a28117ecdb3bd5eaf9dde164c6d7671abf974dd055ddb9f3d75fe54f2379b6e16a86e47640f14149360706a68ba398f3d5d9c121bf1dbad04c5aca115493409eec152df329236f2733bc1133f11ac6134500fc0bd7fe687198864a8b6bfd7eba7143d34e28cfee0287616cac7b1b126040d89993c6d6a7f5afe864c66f66a3fdc7ad725c4c0323ed4cbaa49035e183ce8b8c10ac049a9947e4c596883b505f30d919e8688fcc783d744c43d33ddeab2e4d2782ff91e276610ac1aaffb1c2ee370ce1b07635ff4058bdb151e14a0ac30203f7403cfd0797a62b687c"], &(0x7f0000000400)=0xa6) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x101) dup2(r2, 0xffffffffffffffff) dup(0xffffffffffffffff) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r11, &(0x7f0000000000), 0xe) setresgid(0x0, 0x0, 0x0) 07:56:26 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfl\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 968.578225][T20776] XFS (loop3): Invalid device [.], error=-15 07:56:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5450, 0x6) 07:56:26 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:26 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfo\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5451, 0x6) [ 968.897777][T20801] XFS (loop3): Invalid device [.], error=-15 07:56:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0xcf}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x2a0000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f0000000080)={0x36824f7d0c74325, 0x1, @stop_pts=0x6}) dup2(r0, 0xffffffffffffffff) r4 = dup(0xffffffffffffffff) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) ioctl$MON_IOCT_RING_SIZE(r4, 0x9204, 0x2324) [ 969.016725][T20801] XFS (loop3): Invalid device [.], error=-15 07:56:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000) 07:56:27 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfp\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:27 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5452, 0x6) 07:56:27 executing program 1 (fault-call:16 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r5, 0x0, 0x0) 07:56:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$rose(r1, &(0x7f0000000280), 0x0, 0x10180, &(0x7f00000002c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x400, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x9, 0x0, 0xff, 0xff, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000300), 0x2}, 0x1, 0x101, 0x1c, 0x97cf498311963264, 0x1, 0x7ff, 0x565}, r2, 0x0, r3, 0x2) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r9, 0x400454ce, r10) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}, 0x40000}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}, 0x6}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000280)=[@mss={0x2, 0x9}, @window={0x3, 0x5, 0x6}, @sack_perm, @timestamp, @mss={0x2, 0x8001}, @sack_perm, @window={0x3, 0x1000, 0x5}], 0x7) r11 = accept$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) setsockopt$sock_int(r11, 0x1, 0xf, &(0x7f0000000180)=0x100, 0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r12 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r12, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r12, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 969.340877][T20830] XFS (loop3): Invalid device [.], error=-15 07:56:27 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfu\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 969.414178][T20830] XFS (loop3): Invalid device [.], error=-15 07:56:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5460, 0x6) 07:56:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000) 07:56:27 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:27 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfx\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x6364, 0x6) 07:56:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r5, 0x0, 0x0) [ 969.765347][T20853] XFS (loop3): Invalid device [.], error=-15 07:56:27 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xf\t\x01', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 969.838639][T20853] XFS (loop3): Invalid device [.], error=-15 07:56:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000) 07:56:28 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x8912, 0x6) 07:56:28 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000700)={0x8, "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", 0x1000}, 0x1006) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46020509030300000000000000030000008000000024020000000000004000000000000000ad010000000000000300000009003800020000000101018001000000070000005000000000000000f8ffffffffffffff0900000000000000050000000000000001000080000000000401000000000000030000000e9f00000900000000000000ff07000000000000010000000000000001000080000000007f00000000000000070000000000000009cb7fd9b9db2b0ba896fc6a1a7333c8091690fdce4f5cb678fd55a952083a305b3e8e6a2ad10c6b7baa1504c212643385d181e996a1bc7ce88e537e24efcc93bdd3ca961fee8e224e70bc7c8b129ad4a2f9e03a4c4ed3c06db622159a50adaf90ae8a30f7a9124b0000000000000000000000000000000000000000000000000000000000000000000000000000002200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/792], 0x318) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x1f01, 0x0) ioctl$TCSETXW(r3, 0x5435, &(0x7f00000006c0)={0x6, 0x20, [0xfffa, 0xe4, 0x8, 0x5, 0x80], 0xe1}) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x220}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000327bd0000fcdbdf25010000000000000009410000004c00180000000462726f6164636173742d6c696e6b00"/98], 0x68}}, 0x40040) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kvm\x00', 0x24100, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$KVM_GET_REGS(r7, 0x8090ae81, &(0x7f0000000580)) 07:56:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x8914, 0x6) 07:56:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendmsg$kcm(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)="1656f4ba05b79667802a51106a28d3d0f1e4f3c272170b87a534627444110a18aa9e1f41d9570af85b791759d982a1072a81edb6f703dfe3bce6811d614d9d408a83eab65e0983271369e052938c7dec72b80188c97c4f3a64562756a7ac40911d9444aa522c3c5894588cd0771d0dd6d4b693cc51307d1409b565aaf30f94c6909aeb65d3f7579e0f7b9755ee31f3", 0x8f}, {&(0x7f0000000240)="ce4de83da1114eb41869dc311c4717ff299c340d9d23c9fccc9773accfd5ec6e16cbb7bb3a9b9e71675693e2dfdcced1756796da068c791f13207b3b96bafa4638ad6d1c469c256020437ee645db19906d0e1170e018f6988f74892f01f572dee417d4e390b3a83c4f64be18a1a727c96d700d1d814678b1174e", 0x7a}, {&(0x7f00000000c0)="834d2f03a5f4bafdc75c0f22d7715d6753a51f129fd37ef1", 0x18}, {&(0x7f0000000300)="a871fc8e6c866f355bde10d6e85a61d0b8b66f2e4998b56ebdaecff08fcecf74e4892273c4bce060d6ea9c6ce286eae1e156da836b2b33174ba36a04b4d74ccd0d28af624636294ac6b08a96e51c25b458560844495e528e68c8921ea37b5dfb07dd71707189c97a7e95ae60474aaa473a0eebf08968a1e7", 0x78}], 0x4, &(0x7f0000000880)=[{0x110, 0xa2840bbe7cede7ee, 0x6, "da7279b42d6429384ae00e610a998cd7a65b73bc3daab8b5c43725d4cadca6ce652f6c8615f38bc311453058f13c5cc62567c430113ca4768c1fb6f0207e769147c4c54da2e8e376bdbadc54c3d4c95203875e5c824a6986318b3c310c432d9092eb4cee632fe21b5b0a3bd44f305a2a78bd96cd0865116a84988e0a2a9c413d6396da0d598a81b696f8433c70495b174612a5c3766154ba2ed3793913492149ac21e4d5e532396985d373368502da13d41adba232d462b13cf14c7fae545d0f26d9bdba758b5a0bae425239b97bf0d5498b9f07948f40953c0d32d8aa4c74e040445fcb72026061df19682b0fb1fc0db431dc9f32885ab38b"}, {0x80, 0x108, 0x2, "c0ec7b5f450b14c104c09bda903d85c5a5f086f982c41b582b6ee16e426b73ada33a52b36e1a6f2b3568906c41bacb0363deb303075b6734624b77efd695724f02d2228b598ef5fbe70c679675bbe4f9d2ebc6b1e042552e892498c03769ce3f1a961de9dbee871e1f"}, {0xc0, 0x107, 0xfffffffc, "012e7b85776a0a2aa063262bb313a58b728ac817755006b6d1ab71a74aee71811a450a82733e65bb39fb5ee788532909900a939192dbbb70ebb71d2e01572cabea80d40d964f094f0a16790f95a0fa3072d41363aae602f97c22c6ad3cabc8afd3b41f3ee0a640eb2630289b76f0eff0114ef37d61224201e29dee13505b40d2d446683cdcefcb915ce39ecd4981b8723c94e1745206930f136c46da6d74c3c72d5333c3244af7c424"}, {0xe0, 0xc3493a8ae61e54d0, 0xf, "33fcab3305cc47b5afae75f8e19ba6f259e7bf507a63aa285d4a42695224ebb419d775d90f90fdc2054a73e67504a4096170e73498273715fefcc050b63922b06f6793dc8a7dc44fd3ad12145be9fbb8b7772e7280961a81b4bb475fd477b4c6d04f0827573cf0b81b179141b837f4c697fd9670bf4a33d2e73fd5225f454707b8bec15aba69d3bdb03b1b46c59ed6094b02d6030b9231394706f4bca85cc6aa34c8c8ad4617fbb165b40b631e8e46283f5d12fcd406c72d7f45cbf85baf2901573239d6eb12d845aa1fe5c72d"}], 0x330}, 0x4084) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r8, 0x0, 0x0) 07:56:28 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x02', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 970.144909][T20876] XFS (loop3): Invalid device [.], error=-15 07:56:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x8933, 0x6) 07:56:28 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x03', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 970.325294][T20876] XFS (loop3): Invalid device [.], error=-15 07:56:28 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x890, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/150, 0x96}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000040)=0x1) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$getownex(r5, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_getaffinity(r6, 0x8, &(0x7f0000000180)) setresgid(0x0, 0x0, 0x0) 07:56:28 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000) 07:56:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae00, 0x6) [ 970.556381][T20904] XFS (loop3): Invalid device [.], error=-15 07:56:28 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) r9 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x200) r10 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(0x0, 0x0, r11) fchown(r9, r5, r11) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$RTC_IRQP_READ(r8, 0x8008700b, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r12 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r12, 0x0, 0x0) [ 970.727451][T20904] XFS (loop3): Invalid device [.], error=-15 07:56:28 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae01, 0x6) 07:56:28 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x05', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$FUSE_DIRENT(r6, &(0x7f0000000280)={0x60, 0x0, 0x6, [{0x0, 0x3, 0x9, 0xdd4, 'skcipher\x00'}, {0x4, 0x1, 0x9, 0x4, 'lrw(aes)\x00'}]}, 0x60) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x3ff, 0x7fff}, {0x4, 0x3}, {0xfff, 0x80}, {0x4, 0x7fff}, {0x8001, 0xa2}, {0xb3b, 0x8}, {0x20, 0x1}, {0xff3, 0x137a}]}) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) setresgid(0x0, 0x0, 0x0) 07:56:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000) [ 971.040602][T20929] [ 971.058066][T20929] ============================= [ 971.078755][T20929] WARNING: suspicious RCU usage 07:56:29 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x06', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000180)={0x1, 0xfff}, 0x8) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r6, 0x0, 0x0) [ 971.102955][T20929] 5.4.0-rc6+ #0 Not tainted [ 971.112467][T20932] XFS (loop3): Invalid device [.], error=-15 [ 971.119988][T20929] ----------------------------- [ 971.135910][T20929] include/linux/kvm_host.h:534 suspicious rcu_dereference_check() usage! 07:56:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) accept4$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast}, [@remote, @default, @rose, @netrom, @default, @bcast, @remote, @netrom]}, &(0x7f00000000c0)=0x48, 0x40000) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r4 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000180)={r5, 0x1}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 971.172614][T20929] [ 971.172614][T20929] other info that might help us debug this: [ 971.172614][T20929] [ 971.212870][T20929] [ 971.212870][T20929] rcu_scheduler_active = 2, debug_locks = 1 [ 971.253993][T20932] XFS (loop3): Invalid device [.], error=-15 [ 971.259427][T20929] no locks held by syz-executor.0/20929. [ 971.266331][T20929] [ 971.266331][T20929] stack backtrace: [ 971.319094][T20929] CPU: 0 PID: 20929 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 971.327040][T20929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.337102][T20929] Call Trace: [ 971.340408][T20929] dump_stack+0x197/0x210 [ 971.344761][T20929] lockdep_rcu_suspicious+0x153/0x15d [ 971.350149][T20929] kvm_dev_ioctl+0x100c/0x1610 [ 971.354937][T20929] ? kvm_debugfs_release+0x90/0x90 [ 971.360167][T20929] ? ___might_sleep+0x163/0x2c0 [ 971.365040][T20929] ? kvm_debugfs_release+0x90/0x90 [ 971.370160][T20929] do_vfs_ioctl+0xdb6/0x13e0 [ 971.374763][T20929] ? ioctl_preallocate+0x210/0x210 [ 971.379996][T20929] ? selinux_file_mprotect+0x620/0x620 [ 971.385472][T20929] ? __fget+0x384/0x560 [ 971.389652][T20929] ? ksys_dup3+0x3e0/0x3e0 [ 971.394085][T20929] ? nsecs_to_jiffies+0x30/0x30 [ 971.398943][T20929] ? tomoyo_file_ioctl+0x23/0x30 [ 971.398961][T20929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.398982][T20929] ? security_file_ioctl+0x8d/0xc0 [ 971.415251][T20929] ksys_ioctl+0xab/0xd0 [ 971.419452][T20929] __x64_sys_ioctl+0x73/0xb0 [ 971.424070][T20929] do_syscall_64+0xfa/0x760 [ 971.428595][T20929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.434495][T20929] RIP: 0033:0x45a219 [ 971.438403][T20929] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.458036][T20929] RSP: 002b:00007f63808b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:56:29 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 971.458052][T20929] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 971.458059][T20929] RDX: 0000000000000006 RSI: 000000000000ae01 RDI: 0000000000000003 [ 971.458065][T20929] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 971.458072][T20929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63808b26d4 [ 971.458079][T20929] R13: 00000000004c33f7 R14: 00000000004d7678 R15: 00000000ffffffff [ 971.559091][T20929] [ 971.561636][T20929] ============================= [ 971.566632][T20929] WARNING: suspicious RCU usage 07:56:29 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\a', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 971.605424][T20929] 5.4.0-rc6+ #0 Not tainted [ 971.617054][T20951] XFS (loop3): Invalid device [.], error=-15 [ 971.634099][T20929] ----------------------------- 07:56:29 executing program 4: getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000000c0)={0x1, 0x6, 0x5678, 0x8, 0x1ff, 0x3}) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r5, 0x0, 0x0) [ 971.697997][T20951] XFS (loop3): Invalid device [.], error=-15 [ 971.729480][T20929] include/linux/kvm_host.h:629 suspicious rcu_dereference_check() usage! [ 971.759028][T20929] [ 971.759028][T20929] other info that might help us debug this: [ 971.759028][T20929] 07:56:29 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 971.814279][T20929] [ 971.814279][T20929] rcu_scheduler_active = 2, debug_locks = 1 [ 971.880874][T20929] no locks held by syz-executor.0/20929. [ 971.923377][T20929] [ 971.923377][T20929] stack backtrace: [ 971.973171][T20929] CPU: 1 PID: 20929 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 971.981125][T20929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.991213][T20929] Call Trace: [ 971.994543][T20929] dump_stack+0x197/0x210 [ 971.998905][T20929] lockdep_rcu_suspicious+0x153/0x15d [ 972.004301][T20929] kvm_dev_ioctl+0x116c/0x1610 [ 972.009093][T20929] ? kvm_debugfs_release+0x90/0x90 [ 972.014224][T20929] ? ___might_sleep+0x163/0x2c0 [ 972.019100][T20929] ? kvm_debugfs_release+0x90/0x90 [ 972.024223][T20929] do_vfs_ioctl+0xdb6/0x13e0 [ 972.028836][T20929] ? ioctl_preallocate+0x210/0x210 [ 972.034098][T20929] ? selinux_file_mprotect+0x620/0x620 [ 972.039571][T20929] ? __fget+0x384/0x560 [ 972.043746][T20929] ? ksys_dup3+0x3e0/0x3e0 [ 972.048174][T20929] ? nsecs_to_jiffies+0x30/0x30 [ 972.053040][T20929] ? tomoyo_file_ioctl+0x23/0x30 [ 972.058011][T20929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.064272][T20929] ? security_file_ioctl+0x8d/0xc0 [ 972.069388][T20929] ksys_ioctl+0xab/0xd0 [ 972.073552][T20929] __x64_sys_ioctl+0x73/0xb0 [ 972.078503][T20929] do_syscall_64+0xfa/0x760 [ 972.083022][T20929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.088945][T20929] RIP: 0033:0x45a219 [ 972.092878][T20929] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 972.112488][T20929] RSP: 002b:00007f63808b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 972.120914][T20929] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 972.129227][T20929] RDX: 0000000000000006 RSI: 000000000000ae01 RDI: 0000000000000003 [ 972.137214][T20929] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 972.145470][T20929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63808b26d4 [ 972.153457][T20929] R13: 00000000004c33f7 R14: 00000000004d7678 R15: 00000000ffffffff [ 972.180590][T20969] XFS (loop3): Invalid device [.], error=-15 07:56:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae02, 0x6) 07:56:30 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\b', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000) 07:56:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) getrlimit(0xf, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) [ 972.247339][T20969] XFS (loop3): Invalid device [.], error=-15 07:56:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_INSTALLED(0xffffffffffffffff, 0x80024322) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1, 0x1}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='W\x00\v\x00'/19, @ANYRES16=r4, @ANYBLOB="00012bbd7000fcdbdf25050000004c00020008000900ff030000080006000900000008000e004e220000080003000300000008000700018000000800060062000000080006000400000008000d00010000000800070001040000"], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000002c0), 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r6, 0x0, 0x0) 07:56:30 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae04, 0x6) 07:56:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000180)=r6) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r2, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvmsg$can_bcm(r1, &(0x7f00000070c0)={&(0x7f0000004c80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000004d00)=""/134, 0x86}, {&(0x7f0000004dc0)=""/49, 0x31}, {&(0x7f0000004e00)=""/4096, 0x1000}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000006e00)=""/100, 0x64}, {&(0x7f0000006e80)=""/154, 0x9a}], 0x6, &(0x7f0000006fc0)=""/217, 0xd9}, 0x2) connect$can_j1939(r8, &(0x7f0000007100)={0x1d, r9, 0x1, {0xccfdbc44f2cf2dc2, 0xff, 0x1}, 0x2}, 0x18) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r10, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r10, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:30 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\t', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f00000000c0)=[{0x5, 0x6, 0x5, 0x8}, {0x6, 0x0, 0x5, 0x7}]}, 0x10) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r6, 0x0, 0x0) 07:56:30 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 972.587798][T20995] XFS (loop3): Invalid device [.], error=-15 07:56:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae07, 0x6) [ 972.701965][T20995] XFS (loop3): Invalid device [.], error=-15 07:56:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000) 07:56:30 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x80', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:30 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae08, 0x6) 07:56:31 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 973.036628][T21026] XFS (loop3): Invalid device [.], error=-15 07:56:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000040)={0x0, r1}) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e00000000000000) 07:56:31 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae10, 0x6) [ 973.136939][T21026] XFS (loop3): Invalid device [.], error=-15 07:56:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f0000000040)) r6 = accept(r5, &(0x7f0000000180)=@generic, &(0x7f00000000c0)=0x80) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r9, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) r13 = openat$md(0xffffffffffffff9c, &(0x7f0000000700)='/dev/md0\x00', 0x0, 0x0) r14 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r15 = ioctl$KVM_CREATE_VM(r14, 0xae01, 0x0) r16 = ioctl$KVM_CREATE_VCPU(r15, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r16, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r17 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r18 = ioctl$KVM_CREATE_VM(r17, 0xae01, 0x0) r19 = ioctl$KVM_CREATE_VCPU(r18, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r19, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) r20 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r21 = ioctl$KVM_CREATE_VM(r20, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r21, 0xae41, 0x0) r22 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r22, 0xae01, 0x0) r23 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r23, 0xae01, 0x0) r24 = socket$bt_rfcomm(0x1f, 0x1, 0x3) sendmmsg$unix(r6, &(0x7f0000001b80)=[{&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000300)="7a925848bf7942a8dd937c1f4bd1deaff4749be47ee6af1971e30d64044873aa34e764956c91ebcef0a953209ebb594deca62883c460e0184fd4288160468704db99a916256893a8065f5d5a16f096a56d7b80148ffea84769", 0x59}, {&(0x7f0000000380)="43c2d1302f1b423eedfb22b7fa3652b4977b7102feaf247ccd8dc24e3fc96dc3534b0dabd1e939793b0d8a27b9f384c21e9bc8c242aec81b7381e93915406a11106df07c4f", 0x45}, {&(0x7f0000000280)="d863010a19a3303629e9bd885815196ddb0a7d2221a4fc2e0833b18c5d4e193b42133ca95069e69e604021967a5e73983e675267", 0x34}, {&(0x7f0000000400)="c08504a5c96721d0082fd6f6e9bbb02ac5311b7c130d40af4ee7db153019c2b2052d642a31d36a221276b69748026ad6be1701852ea8c8faebe297ec1b2dba2ecc8c82c65472319ea5d76a60aaf0fc129f3bf89bab04e1b435867c8dea371c529d0573f26e4902f825fe3ed90c3df954c28c7e61fcb6ca03996a60f22e7277a6f518931693dac9d4a32d5dd67a6a5ea30c6b189b796b856e3a54599502e987b3ea6a605896c3b36e57050e6e0f34fff86e6b88f37a4485", 0xb7}, {&(0x7f0000000540)="eea0fefe8d8956ba2f485ff59eb6a2d176e13e43419cb730d3cb521876ec415e8c0d0e3789d938d8aed7a841186aa7e229a2439d778327c766434e5c2ca640c9e2f9a1e1dcf2f076d5f044c6622f3361ee6fb62ca9ae2256f31f11abbd993c7a577be768e4555e643d", 0x69}, {&(0x7f00000005c0)="64407e9a8c4919bfdb57d51d96bb92eadc282556b274385863e0325ec7c5c3fb072ce098fcf1f2dbd55fa1ac196607c12510143842f6823c81895a6c9089a07ffaff825e8eae2b5d4fb57e09136676103ed50913395c7127e36eb43bb1d7dc8f0f13c313ac08d0c1ee96f2c6f6430a0876ad538adc77475e77c3a755dec2cf61d01bdbcc3f2885ac3ca751a6c3ae443dec3733b8e526bee35d8159b5f38cce14ed9b750afc97a75e5be89f4650d5b6da75b245a0", 0xb4}], 0x6, &(0x7f0000001d00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r9, @ANYRESDEC=r22, @ANYRES32=r1, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r16, @ANYRES32=r19, @ANYRES32=r21], 0x42, 0x40004055}, {&(0x7f0000000780)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000880)="c3bb4769a6dd0c77aa66cef6d2fe685ecb298c535cbd2cbdf2b00d5f833bac2da0da36eb5580e6e570c836f2009ff1f594a4768e7b4bf4d57fd916a39e5298bd18a6a6b387b1b13a", 0x48}, {&(0x7f0000000900)="54a2c45403fce56f4d9bb910755eb0ea2beedaa31f352637574deec49af054461ae1cb4ea3df2c279945a9eea66c319b27001f748cd807ca60edddede658733a94d26abcbdba0a490e3b2d6956b39a6200d7646f2e27320d45cf5b4eda6380553ba5a6442bc6526fb7722209", 0x6c}, {&(0x7f0000000800)="9d722095937df60fc9c0e45d0aaceea57faaadc05e3e8072db5c3c8470458053fc59d624271c5046f868b84923cee636d01f387aaefe89b4e4682f1c8222ff", 0x3f}, {&(0x7f0000000980)="26ebac05f44c2ee96380277a36f3e147b130fc9372e5beef214d822db9f25ce5c6157ff3ecf06366eeb00f01316a12aa80d8197a3cd1bf4a0415fbb1ad61f3", 0x3f}, {&(0x7f00000009c0)="27aaca813989dbedd9c420a67223639f6be24d92194eec2d47ed19ba96603ae7ce5d92918daf8ff6d077e09832d46cb161072b2db461aefae46f7ffbf480fd6160b4734ee5aa9671942605bee946286f8f31af3b9be6698e454bf29c659f3877bafaee2d0d9e27a5106877efe60124ff5a3c893d004489f91846a5f874baeda19bc06ddd950028", 0x87}, {&(0x7f0000000a80)="b98908815a266354af47bc061c8c4dba1ba9ed8d0510ec96bde8dd2352596d9a3993da9513520c81e25ff3110c6efb3e47d64b14e0a58325698e2b5bc3e3f426ebe3d27914150ca54113d858ff24d803649195b10a53590cde70d7245de3a2bfced6357a473202a7b84ca4cc3ff90c5fb4cf3fb5cb282e59129b502d01f34d020012c0a36c8387ed378fe51477432059c322f951d673e82e9d94fcc02cf8a5f253e8b1685ea2459a861ee4e96dbbb3c227eef8b50f18df02e262190ae195e05437b6edf41fee57f558eadd60f68b4613ff1b628898c02ca7d855ee22971ac8e42f5ef008648c7bb7df5d7ba958371a6e19611bd5dcc81f9062c0954d324e93099aeb1355863b457bec9477daa917c9e03555b009a0ceb33c5b7aa8a9e40972a52e553ebff8c2cda7a106f61951bcb020349c94b1f9828133b4f0a5c26d5a485ebf9d11f0ba24d14977d8459e7ecd0ee2658956f30ea79302b50bd3bcb60ad1c6a9e43c42726992d97fb9cd13a8cd292313ca300c9f6e4f53edb1b45d1562c7f39684ef772f7a26b70ef7037f4983154c2fa451e78f19897b39657949949fbe564ca46aaa82d2065b135c841d0eae265fe5afcd787ede96328aea84d39a7dbce42d3a99798d29921bd3a1ad1d1fdc478eb52b2f247c479921769173b94dd05066b9713fc52803a37a3af1a3da4fdf08e29fc5be2aef33ea0d486c0d0a9f28aefb074b3687873dcf4abe1722444817bd13048f6c11b7e7efb8c9d23f0e4c3d3dce9e1f9bd8792f006277f66111382955644193f57637b2bcbcd4afa51dbf612428101b9eb9b154bf0a71b4342ebc86a1ee573458fe9256e53e270cd86ec1f2d2c76b6e0ab01972fc42497212f04803c4ec70967242525e004fc25ddd206d166762b6ed5f435eabf031b3e0c2c1cb10a10fc9e198cf1db29f8f463953c7633daa0130021d66fc9bbfca8e12be796d6da323e8e25675fedbdee4ccea80e101b06ef5351a2a14aa81854f7f2fb6c4cca7dd70b46def65a2bc83a5b624ceae116cdf47a076cf9ca70334d1b15ca6ebfc6e291389b2c315391032410f36b2cfd3f5d25bca512e1dcd35cd702c2c567bc552ebd5eaff0146a06740b2add82103da286bf5c9f2838b000edc47a2a632359993513dea00a83499a5d6d9b76519f92c010e84c3319c5903b2699b194f58fd55dad03e8a2cf07a81d0e521cb0701667c4f8f3cd96a89de3ad7d1d2d39fe781868ad2081c1c78aa7fcdae58bcf21cf6fabba8f241ae566a052005a156b8772edc1d379cff4b9f59c6dfdfa42158a32f1c146e61addbd253f4eefc16678cd8d195711f0f8a87f52c0d8f9e74d562ce74833e334c082525c8df90b55d9e99fe29ae2bd481bf6626c983f9d47300338ccb27949a73f5a3e51fdfc874919dbaa3173226b90eecf25d5eb5307f6e372ba53a8abbc476b8f45d45e73f6c459d9354c07efa54b70b98c9adfb6467575ab100f1f88237181083798f6f328213535af640e021b72121f916ffd2993053d9155f7f05eaf90aaf2ac6d0383c2011cb5b3f68d834e3ae4a825c8b8cedbfb208275af82504d5d78ac0b478b7511aa338ed4b497e3a6394cb457c40c6298f9ba412ad34bfc3597128b8f4f1d9802f254f1d0354204f20e98636258d1dc1dcda51fbd6368f004547b79d0450ae85e9515855865fb6bd02c59505d964aad92d242340fb99c367398a7e95370f9e0ad1e8e7e7521777472ba4e37a677827dfe077bb7bba6b3f168e8b6f1fa98575742a8754c2f558dbc9a364558e7302d27e58bacbf0820755dc28e910095859fa74fb0e81f5a413a72edead590f695c21c624382f1e745671ecef8ad135ad732e81b3e7871175cc98d5f3ec86ffe91b4bf3d83937210807acbf695897f095be03076be2af7f015cee2ffe83bd7240ffe16a7d2f477d2b125eaa90aeff799f2ac15a5eebde5fa31f4b10dac0d78b0654dff803c87b59f02572ea302d864fd17d4fa2703141d74746c710014472d0ed8e97b059e78a681630552ed4e31b22902940875df62aaaf82c10603fd074a817862093a7b4585abc03af46f9dc301fe4133b7cab00c30bc18123966f55a6f63fb6dc4c628eda03de4cd2203a6c5239e56d992c81363032a9968976b28dd60e786f6455184ce0f8f2126c4a2b503f28e267f1ce95c047a3c1177874ecb271063666e998e9d0704f6a2851db7ae7d27fd848ecd724c2d22e472381456daff0f8ff316d03f4b31a14dc9d613349e8906b1ec8e3bf8475f3db393b2d66cd554af54e4aef8276a20d55ba8b18b2a6b6771bb8273f4db01bc39c3ea90db3629b46c9269a8e29b2b99ddf509ba28329ea44501a7687610b57227199d146290b51269d4ea41680f64a47a1574d31c11ab06e38a125cab7c12443c9d1ef6438dd1e6577ae1d170039661e84a21e30e637c9902820cfd83b36dfa2a3a43a3d12dac522ad60aa3dcb175012703f80457d08980e9be719360c71b2acde57fe9cf20ac0a378c7022f7607d33107683997cfbe6a2adb5e26f44ea671a26657a9d06f10c156198c8c411ef3b800423c857eb1ff6a47a815d470bb81d1b8c367e1707c7f5d613af7ff28cc4edf3e8c99873a0fd1dcce9a7d75a5988b4976106cb86705989f76036df1473c7a4f6576e28e175550de5fa34f49bfea90f797b26862b9f65fffc5e177d9ee6486df3938f2af95fc3e34d0f43c551b411039ca13ace971956fb0e92d6b66695f9b43782b784690af81a341bc5b52ab8262a6ca48fd457c2f44d822ae38839048e709a26edc3099f5e7dc9804a16f7776ec18c6c1a4ee2f0aa60f55977cffc7dc03b23993c916246d406114f32ab04daefd59275ab7069046c17a68fb2a7eca90f4fc1ac20ead2d70d625e234a207898c6d317d2a337999d69f331241627fba9b03fecb5f6a07efca4b41e13a2dc809ed1fb7c4c2c3601cee07a660875ff221d3495bd4960f3a02aae9d29746a7912caa037f11e72223feec9ca7eb4709e2cabee46b416922d9039356d7c7596b5fbfdcfcc1f3278d5b030408c1e4950938e1a9bb014701daba3e34de327e9d2a64b01226580d815b74f503ab2e2cd025aa580ff52b4da7b00d1dbb7e001b08f54f26edd58f1eb266a6ac5e05cc9990074bd4222470fb84d415f723e5bcf4dbd677d14063aaa6e017e9e3fb902ea5be9e3098292f89f7165d467159f4ea5f700d0361d2332623d364104030bf66ff6397413043f844fa7ea7e8c7abf72fb30a21f5368cb437c5ecb173e60a8f3c9d9051b907c2f38cb620486360d1a0305b32103abaf07ba5a2709aa81aca8f6dee41e56b94213d3227034309dd2486154248a196ff9385f5392c95ac2d0c6a8d4b5f49d607337d34867a21b9f3bd57c783496efe30712f87d29812f2481354acf154e5ac7db395fd0330ac0c0c026e5069fa6a7af3627a73c4aee34b36bd923f6c769d5231fff265e5a7099583c6df7ac8aa45cb42e3586c3bb9601812b55af40388f93c8ba13d3b0501407efcfd3c646fe8d9c6356519bc2363e78e0c5722ab9d6bb5c5db57209de2998fade621306122e213ba71a863fa9ca3ffcfdce009de18cbd77763fc16ac529c1af4c0c2d400225bb543c392eac38df8c324170c841adeeb8eb23d1d9556a5a21c4b68cde727403f00c92ff3dab94e5a0e786e07e0f6c7d832d816bea2b5386c87bf165a2ba36018f13219917a648cdf0ad34f9e9eef116cc76b26f38fa0b847d9c31c03324dc1ed66d2637565fa5fbaf4ba9092f06909e5c9289a346ffbe63ca002bc935435e71f1def999d6a59bfc790c8fa13a9cfd8c9ed8b4e3dbe4f0ad4e8e5f520902a861407c9fc347f034c08cb0782206ecbc1d28c1089264e9ad65e9264ab688d224d6fe8b91988623062925c438204be21f97920bb70f06660befe1d25c3eb8aa149c7d066d702b02e1f3e0d85b092505c31488c6cca67d4b0a24db11c8a5ae024e70d1afd65388b345eb942c752c58f6d902aa68a65e703e548620ebb47fdc878f5b5635ff2a1c83c36bd8bff47f8fb8de6df6f98f35f7dd2d0aba17fd262f24066d5dc93ab4ae5c6889c7cc7efd5c12b06f859227612d675e334c8d17f47ce51fa3262fdf7db2b558d6abbbfcdac3fcfdd12a66e9557011b1aa81e548c31c34c9c1a1f841916d9126b80e4bacc4b004377cc8ab110d7cf925d02d06eed8129eb17795fec1fd433f77ba08015f260addb89cfeb0ffd7969067e6dc1bec4d9e7f11430d0bd81b8ae2032e951db7700157e76331c656dae8566600f9f6945f155271c64f4141dea642a0fa14954e3552bf718e61a0165c96795d628d4914b900c19077713cf4f23d40f6a0265c3d2e54fe4ade14aa69ea27391369e373ec48f29ff556af0dcef7fa426492ff01b136aa966e3aa7a3fb7133eabd5c66a7221775a1e70fa9ae14156591975d07b7d60db410a0b3d4c3f90c1f63762a2913c8ac4d5e486bb3b1cb460d5636ea759e0dd0361ad3d88e49f1b8d31d0f7a9b5238db5d3800fdedcd6626f114f7628208c5c6c278a24cef23642bccb117ef240fa14f8ef615b69fea3438a3c5b7267d6200d8b713a58dfe586e0ae75eb3f55639c1924ad6fc8f0a24e846374c8c072285251b543f1d6de586bf1f1b3945dd3eb0e6ecc36fc9d9422b502d708442ef1d89a7defc02df109f04252dc3a6ffff8873e75737fb10b20b01736e5cdb49da22f56b1ba5bceeb93879df69ebdaa6efd66112c5f079d54959b632e01d3d62492e2ba4382b12378762561cd55df62246755b4069d0cf22db410524267425ee9e34c1b0472d48c66fd6664491507fb6627ed06d841002818253bb1781cf655f0a46ae4021931660e2d45a104b7461dc57d62a1dea67c5662a0e8d741e3ca688e83a9fd1c8843ba607f76cf35df42e1fb18a8f2ef4eac8e5f00629d80288253aefaba2fcfd623f559b58b75b519001f903b395667dbdd6b6dbadcdd610b040255fa15304959f48b826f5e37a6857f8e70dfc7b4831401e00bf6627281cb031f15418db75a6f0faec82845328dd1696546fe5fc51ba6dbd8a750f50f1685d4b50f7f0d799e234f0981f72fae919feb4b225f60f43099ab70febc510956a4bef093bfd8de1241de7ed070fb0812b36834e5c3fb28ac98aacd886c8b434c3180ef046dbc3809319425d948b5761baafd1886be7498ac108bdb047accb6871d2572fecceabfeb2726ae0a62ccda54ebad2cf328e32e732c1886d0ff093520a8dd904cb698750b870c6000dde09feb808e9f2ff9f5cb7576a6b3b5fa61b8268ff9b8b1769509ce3159b8ccac3ff35e7760e5f63f3744f4a5baaab195d240d68a7c6ec6e91b1759c9891af4525af76b93dcfcab0b1ea2e61cd903695e46c1a7b7d4f5b7916b2421ab9f25affd2da52e4cdc8111553ca2af49d16b17c7cb88bdc92ddccd1d1f6d518de133b78cd6d5be8b71140b721c279e4b9218f92345b3120568acbe4bb2b2a9748a824e572743fa0a391bc37fcd47ab483e7c12f325fee01af79625be5d78176cc59bd778afdd1f86a17fe78bab31ac89e3a0458a5fec5be95f9bbab515265208df776f8c18c25444c7936f65de171ef2c47a44a5c6fadc27c2d1bfd5e326b1255091fdf560d68a000a02f7a26a9f1218793a14112f22072dde78837b15f93d4a020db11c5eaace2d8b60df9e7c6e4ace5971de075db80f54cc518a6123395e250bc8d7f736d6f81ca842eb298bfabdd61febbbdc2a9bdb35fc6a7f55093a2b2ad73983e02d7ca1e998d00e60835b72ce39fe", 0x1000}], 0x6, &(0x7f0000001c00)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r11, @ANYRES32=r4, @ANYRES32=r22, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB="100000007d1dccdd54e3c81df80c21d1502e5f12560000006a678c443f4e4e523c5fd0bc18688d4183bfc904cc7cee7043eaf44d097a8872b44cef59819077de64e05974f73ce7bf65d13a0b2217fb38f0abeb1a94816102382c489ad75c7b6c345ccc5697fced1b5d47d499ea4e0149e2094ca837b50267bd97517d064a216d5546ffe5648f150334948e3c71"], 0xc5, 0x800}], 0x2, 0x20044000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r25 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r25, 0x0, 0x0) 07:56:31 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:31 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae41, 0x6) 07:56:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x5}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:31 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x01', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 973.536909][T21053] XFS (loop3): Invalid device [.], error=-15 [ 973.665437][T21053] XFS (loop3): Invalid device [.], error=-15 [ 973.673720][T21057] kvm [21040]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:56:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000) 07:56:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae60, 0x6) 07:56:31 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:31 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x5, {0x9, 0x0, 0x80000001, 0x53c}}, 0x20) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt(r0, 0x6, 0x81, &(0x7f0000000080)="be1b0dab71315e965bcc340d70995e1fe63626946e007a57ae5a9f47a9a6862022eda1c8dda2572fc9ba4b", 0x2b) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x400445a0, 0x6) [ 973.982658][T21083] XFS (loop3): Invalid device [.], error=-15 [ 974.119315][T21083] XFS (loop3): Invalid device [.], error=-15 07:56:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000000000000, 0x880, 0x8, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) llistxattr(0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) accept$alg(r3, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r8, 0x0, 0x0) 07:56:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x400454ca, 0x6) 07:56:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000) 07:56:32 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:32 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000080)={{r2, r3/1000+30000}, {0x0, 0x7530}}, &(0x7f00000000c0)) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r4, 0x80dc5521, &(0x7f00000001c0)=""/157) 07:56:32 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 974.527611][T21107] XFS (loop3): Invalid device [.], error=-15 07:56:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x40049409, 0x6) 07:56:32 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x36, 0x1, 0xff, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0xaa4, 0x4, 0x8, 0x2, 0x80, 0x80, 0x7}, r2, 0x3, r0, 0x8) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 974.627765][T21107] XFS (loop3): Invalid device [.], error=-15 07:56:32 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:32 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) bind$netrom(r6, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null]}, 0x48) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x401, 0xb676690df93ad6c9) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300), 0xfffffffffffffee2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r8, 0x0, 0x0) 07:56:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x40086602, 0x6) 07:56:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffefffffff7f0000) 07:56:33 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x40087602, 0x6) [ 974.943924][T21134] XFS (loop3): Invalid device [.], error=-15 [ 975.072367][T21134] XFS (loop3): Invalid device [.], error=-15 07:56:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f00000000c0)={0xffff7fff, 0x2, 0x2}) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r2, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f00000006c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000280)=""/166, 0xfffffffffffffe1d}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0xfffffdc7}, {&(0x7f0000001880)=""/4072, 0xfffffffffffffdcf}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040), 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r8, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, 0x0, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) sched_setattr(r9, &(0x7f0000000040)={0x30, 0x0, 0x0, 0xbd, 0x4, 0x9, 0x0, 0x1}, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4008ae06, 0x6) 07:56:33 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:33 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000) 07:56:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4020940d, 0x6) 07:56:33 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 975.465580][T21164] XFS (loop3): Invalid device [.], error=-15 [ 975.592595][T21164] XFS (loop3): Invalid device [.], error=-15 07:56:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, 0x0, &(0x7f0000000040)) sendmmsg(r3, &(0x7f00000034c0)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000240)="2c38d6ca64070838ac1525614ba27346e393c68c9ac0f8dd2d7cee41cfdaaa785256076ead4df57685ca3585215ea5c5ba1f32c3d1d94ff04b00f400c42a026d858bded94dd2f85114b7762cbfd36e070ed0a762758514ecbb980f85eef6946efaf9a100ff63a975461283", 0x6b}, {&(0x7f0000000300)="2628c8292853b3d9684fcfbb22711d9e4045735d91f915cc913044d0a69684ce57310a2e73c6d487252e6ec7ee626007a33a24a746f59145c6a697529c3006182c7905a8dcfe05823480a2694b0755ecf91ce8519a31c6d83f405b60982e26bf6944ffe20494f8c648ae6ab90616875fd2a7bba44b920fd00055163ce0d3f382953a1917d937594964c5720292578e0bf2dcde7bcc14e3118e27f7c75ae181c48a", 0xa1}, {&(0x7f00000003c0)="fadb5599cf52a924a8e1b4228e81f6c856b7b595dabf04653c807069a20d9e434dd6194c4a248c900e6e4a4940e76abef5aaf33447ea4a976cdc85bf1610b39ad09a3850b73b51bce65ae3876e502bff0c4f1f37f5de61c080ea35cbaf192a5ae2b8a753260214b2038a40d332f85b67d548323bd6aced1d76765d87694e6ba29c26f25d27c5535e15b64606dd2d71fd50954de079b6975537cfbf4d82aeb1d1f061e960b93b1d77cb2ee4fecfcc247edac9b734f34e259cd7468f55", 0xbc}, {&(0x7f0000000540)="0900630f03d1c7d42d8bd8c52542665be832bd0c4b8b6b7af2191bb72c6722cf8736404fa03156d537fb8d8b7e375354c7039f7f59ccd0dd13cb2ba7827273e72ef8758396e3ef3ed979eed037c49d44f97bb8578240607bfedf28d0885238878612a7d9dbe764ce80de5009e5fa18c88c2e683b12720074e1bc0a7e50f268c6f849ad1db525aa857dbc3bb4332a42498a6434a240886451771d32fd57cd51e4f18ba6101814235a50014fc5e04402", 0xaf}, {&(0x7f0000000600)="90059cc9abcd4a3825e8e599ec188e2aa721812c21ace11d3aa05ff4efd9497ce9f9eaaf3b7dca8bd58ab50eebfe185fc61a62cc344fa6da25c653bc7ca853d2efc593d6ff4ea0a7edd00b2698f64cd18ea31f83c209480df4e4d09a41ce41031530a13415977bc410a61c564c94ceae0745317afa3268547a225a668bca167cc8861647c8a9726802a5b7f73cfc30c60922b3da6f3a291b2118a09e5bc48260be4ec2d73f4fd6089fad3a7bc480488d737ea030ab1982156788a32f0dddd3192278d930fda0af53d2", 0xc9}], 0x5, &(0x7f0000000880)=[{0x50, 0x109, 0xe9, "4b15702dd0e4930c2dbeabdd1c72e05f3e003edadffe4466b9cd71923188fa58d2558bd8c41a3aa8413cebd7198897d171b967eee246bd09e2"}, {0x18, 0xff, 0x1000, "ab0d39"}, {0x110, 0x11, 0x2, "b670a889a9e4b43ab02601f764246e5cf80539ea0b677ffd0f402ef5cf900ff1766de6d78b0c7942eb95eab2512ae8c0020482ffcb9504ca79cc71e07fbe6a7b4d1e06e46b67f57357668873ad310b17834ac84ae563fce8bee7114f693813c7a509185cba7865284052644074a14c0075831cbbd6fa7d3d1502ff0b1170aa76e6114e64c5e570c21f89ab6ddbafcdc5f0a0d6acb3069abf0a0bab9e339dcc93efc5ff94141468c3a92f06359c3cdf500bf373db324243e17f70b5f8ce33e1cd87e314ffdd098fc3a29b1bf6ebce3075c4dc1ed979fcbd3c0ed10d306822285aa7c4604b2de1821c234fa69a67e7da56b47fb66f742544f54f"}, {0xa8, 0x0, 0x3, "fcf5ba56d30113f2f4765472d624f8ba32edde87f5c2147778149722c62a49ea2a76b1789712339b7ef71f55f03578dc19a01b12160b976335ea7613cd5aef1c112973b686f79b7952feb95eca6f3cf750605460e02392e352fe82bbc0256e48e0a9ab7d5eb4f337b7298fff678421b16b2fa93df8fe3fa004e8617158270d79688d659d9dc1d80b481906547a1128df8f68db"}, {0x1010, 0x114, 0x7f99, "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"}], 0x1230}}, {{&(0x7f0000000780)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @empty}, 0x0, 0x2, 0x0, 0x3}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000480)="054df37f189d0d6515df65743130003077", 0x11}], 0x1, &(0x7f0000001ac0)=[{0xb8, 0x3a, 0x9, "412e92a37f76e7534040a5b635fa0b99ff466c0a7261cba33f337a241a63c564472f1930afa1c3b4a23db1b68e07354816cd94598e8083e8d00626e9ff3d7d316ec8871ede0209c9320b82f9d17590b4d4a8fb1356b3c08203ba84436892c9f461bf9970e8b28888859088eabce8eaf95eac34c07fbe9a14beecb7cb3c2f6328d8332653d2e323d341d7b7e78a681ff32dfbccbe2f636ae93fe8d8bf4fe9f94c0a36cf3c94"}, {0xb8, 0x104, 0x6, "a4ae4a3dacff78fc6728a97e7a41381710241a66289def4f0f00e29fc9cd941faeff24d3838083906aed4af0ab036634be1041ce94c3813dcc94c068392554cc20fe79200064f641a74be7fc70e28998eef782eba27a049c41351da34ba73a9e1406547f6509dbf95b6f1ab1912aa2cf51f5e2808c4eb64798f76f0265eac83cdc80521001dbc6dfbf1055dc1a165c4e567c9f22e7d6f3c15d7961dac61b578fc0"}], 0x170}}, {{&(0x7f0000001c40)=@caif=@dbg={0x25, 0x3f, 0x6}, 0x80, &(0x7f0000003300)=[{&(0x7f0000001cc0)="f82b503f0286d93bfda330625340a291ce2fd8ff10f743510bb4eb1abb5148b6be0f5c372bd4f8822df32db4da79d511cd6de6b7ada4442d7ff0e2ea6840fd17dc67b80efa7644e0bd6106ee7363224e3728500ab145ed773370e585819220ee49ba650f85913eecfbf975e6e83a989ec02991f9706e70a051bc5bd81ec5b84dac818cf89bef23ac65601857e745b16ad52b20d69abb16f8d39202b75cbb569fb5d88135b5132cf279712730b66dcfd2dea01c584728444549301f98df5f8ad38585611871936d2824c177e810bfa88d7bf051cdd3f542736b3480", 0xdb}, {&(0x7f0000001dc0)="85a00380f464ec242634428f488c4e86f4c418d164ade3c447f56050c0fcd1efb975c0116503eb1099e24edfa62e80197eb84e59f6f47e3600fe55616894aa835ad34170f38da14da8fae012e9343088e6a2453f93440732fbe1816b705e23a301f4f0d076b0eab9273dfff58197bf103c106e90273a11b4fb87494f2afa4f32fd9337e9b1d98f41ced7341b5bdfe32dc6e06d07547acd714809282b5d9dbf1b60eb71a44d643a4825582ab9db4f061a91777c0fec753884c8e2fb4e5a65621e15eefee122dd24da97172e0c34a766a6f9039f2dd4e95d5f92a634b2893754d0d3f86fcdef2c5829c80e12dd50cd", 0xee}, {&(0x7f0000001ec0)="0e530916cb06bb84192b8af636f9528e3d50fc2e1d62935e7c98c001a108190e8604fac29bafd3209617cc283684d072963f1c", 0x33}, {&(0x7f0000001f00)="0167939d9aefd402256f1e7e9b0bc07205c22a0df1aef72462990a0704a08feced3866e81e9d4514fc935baf084fb29df72ac3103c613fb1d0aacd783900f0bd690dc1fdd8fa3185f5e39c72a07a47a416d30cd8947553a96cec343bbfcf29c1ebf0f82b79b27e3bf2c4ccc20fe9c1d0d393d98b203517312be485f0ca3f804ec5f376fd56e03817952d2e59575cfb097e75a5480da4439003326ede341ee6ec7d648544023dcdc9846c4c174febd3231151ca881492b539869542bd043c597a9c4b8e9faa997171ec6f942100c6609ac8c919ca6eb66f934f51df8fdf01b1bb2968ea", 0xe3}, {&(0x7f0000002000)="de7babbc646871d3c8d8788c310e9b775d5c5eb8c35e852f77aedcc69a083ffcdea454a250375b74b5ce2746b1c4bc33cf348df9f5a4e0b47c54e02ee6ec84d9bfb7ccef14fb58d274842e60a49a68273c339a9c97dca36c3bd6c32c6d5359c9afc6a694c39edce7e4b5055f6d12bdd5cb213e6ba4aed8a365573df922eb7ec3f66d27243a8e31b34d5fc1e94659930e5c0195c6063cb59c8b0f78cd73ec755465a017cd29c4830e47b349a775e16eb404db188a1dfecf0846b430bc759ac9a46354cc13a1fe066e309be705add56ffd8d00c617a436c8287b14f1e986e5e3f375e2", 0xe2}, {&(0x7f0000002100)="4a127e09cbc3a674b9fd47588dd2d8e0396e6500a8c020f3d2a6bdbc8a25c7cdef7c553a35840c6338d3a944fc9199bb458a4ef7a37090bb3e4342de04566257f0326f8dd74182fb4c917750af774c121e2788cdde9635598f148acad3679b4dfebaabba38d8f95a71e2bad3124509401029753408e3aaf9649b0a30554220a0929e3e1c0ff65a44397b8f4d80383dd3df0d82cae61d98fc080292d7f1915de93fba99156b196806139a75e85807322b3e2fc1a03a9828d264f7d8235895f1750e8c673a82393cdeb04db406364be54662c474ccb1c00ba44edba039f9bfb5fcbe7917ac5d883d94090f1d4dcf40004f60cd30301b8ce0302787ed3980c493dab3208af84ea8cb74a61bfb25a1c68558cd8a93cdcebf39a3ca9a355feebb00313895696e7f1e65690176ea4dbfbd93a5020d6342b79a09516676a172c969ddb00a315e7209f53b19d0d0f87b6599991f5c2d8cea2922cf22a5e503e93d1e0c6d13e4882295a8af00c746841e1a24462b2cff6c67e4a0c2739e53c0367ecfa972b2e3f14ead9414b994dcf9668f0e067e26c216edf8d6906383355a33a12388742f54c250f22cce5cb93bd1c665ea8601c9f437edf69900548bed592cb4481c2d8311a346ce9b3cc23b8c340cbdf42dcd197ac83efeaea790377afd7aacca0e842349a929d1102d1e6223a7c278646364d561de6eea57aa2812cd068b75f37a8e81141b8ff105d239c336e3efcf47cacf9050ab99711c1cb7e9fa819b3c6ff049dcdcd2461776341b127f9e117878d8ff0140dc1e9f3b93ff33a5da3e19d35e92ac713eff2abc48dfc06304a139e10d147833ac7364f27b21fdc346da7bcd9ce432da3657aed097891fed3e91bb16ff45dc78e531e3b69c82a685030f43e1f135a88239a2ebf104fb464897bcc7178aeffd01db95be3e5053fcd7bafdbdf166f7b1954fed2e7ad2ddf4fa8509abee36a69cb721a1e728855e714405a42e013784bc75af6fc5eff3713646c06c71be892c56f846ab297994a15e45bd8a4edd95bf6b5796d73558f2e00cc7c77eb3e99dee91a5148f46690d3520f5fb9953d64ea31e6e774a88535dbdc387b55f92a71fb9bd42b456281ad837309c593c85c0bdd95bf88a2dd3aefbcc059e00b7e622b6530e51a88306231a82f7b2b998d02d75977818ed3aa6ddcf9d0f50f3a97e1a22bf60dca15a8b0aec6f66ae9d8465ccbcc134022cfb1b2f67213cf8e9e8a101256a6ec5a80517e7736223554d2d4cbc4737db46e7654f491f9df990d3c2ccd787f3430bc5f03cf5436a71e8bb6126a5c795215b73e48afa572023f45220965610c2243e807910fd9d78c3f8e3c328b75c498b24dab74a97284da4f66220c8752c648428dd940f876292c4f77d3e3b1b303c104847f3403e32297d57ac4c98545cbb8282458faec6bb761666fb69a23b5ecc4254f607bc15c6c770f1bc6083d9d71898555b6de488a7e9aa1db469a7aed4a2ca618883f164dd14c464a81731b28ed653243688dc7a3e33460319ac81f5a6d99db87b7a9433417da69e7431fd34924af85787d7915106e16a15dc689df9a9a3d47b6c93605e44b0a54a9d6ccc309c4c12df9c9e1737e7501cbe942657914a0146410bbf7b4b0386e1c166c5a525bc4977b86587a0e3485243d3cfed962b693465810befad84d403ce7689f44234ba40c9cdced7d7051b54e46acfceed333a439d5a962e49a786bd6602899fd927fd38c27155bd6de619cfd2a705a602baabd5e7bdcac8851483a9da5cb44555c60a2d3decdd063191912f003854693dfe4b0e51d16f730a80a3b0719c6fa657d8e2fa8364f5de2f4173380b7695ea61bb5e938e47c4205dd7f9de2f6a89252731db2b9b100cb1fc86063b5981eef7f5c672fa2eeafc6be1cf5b4afa0e82cc961fe3377fb147c2e3a2696172a137c8084bd8b0b970a1102aef0ec9691f746e10bcb266e588d194ad3896744cff87222c8909f8449d0d6f4c1204edef1c757a480de55953eec411e296cefa389a5937f31bbc346265f20b646f8158a3377d4e07b9eaca1006db96fa99f43bb16bfaefc1fef5ee43f5c9ea073e26584ccd5271cf139da908455fad16bd09aa12b32fd65c215ed97fa9d6a5068c841360a56ad17e89aeeee0acae07bec97ff49295bddaea1d5b2b89b1d1670088b1b5245359ebc04ec16f4cd14b7f71a7f967a9555f985eb3216d1f5e1b4075588f182e6e975e5f8e1fe2bc6bdbd4a8c06abed5ada9c541586dec73e2044cef2faf839306cd874b5281f47c7379aa319c4571b1f5772408f4eb258b76b803d7aa69da522e02bba2df64700614dd8698d2d8b9e61d891c1de45e7dc76e0cc3f98a4c5ad9f517b8d5bb5f5d1c7b25eaea8b454bf109c9f76feee78211ce68594523137499adcc566b8566b58cea3c835d6a51eb6d7f9f1a47b05cbe467c993cf53f499a864fd8c6205d4a08cedf93e022ee8f4216e0f3aa031a15e3ea1305dbf81943eb6b7879d5fb186ad691e43076894fdfc8e72f9200fce8bd1370ec9c5b8b93cc4e6b1b8aff0ea45e25f95888a86d1cdd961ff422461efa915ecae2ff9527f8645f6933f438bf5cece3de751b88278f2862bf331599180a6307a0863361e82b69451a89f2ff8b4c86abd851e835dd815eb0bce7700a869760d3c6ebe7832bd54db60e219ccffdeaee6f8a8154e8454be27551e81964770073f2b7cb353b5e92b108237043b14ef80ff98ed41f0849ffc5a6dbc8ed0c7e47b58e4818e607b946d5405a73d660165326663359904cfbaf858616d176d4a244361f252efa67736b34bb0be2eeafd6fa174247171146748bb4969a0d7204502a568fa5dc4fe0f327db7e5f8c5b3cb8e87468d2af25e871c7137c86c5af6cf1b74ccd3b83f095e60aa882ff647d9ab9e7b2ce194c8397f580ce7eb9660b4cfe0493a11ac2428fe693752a637265f159bba399a42990155231a27612990951591e356b8db41b2215aba3880829059323c6f944b34f8df22a6820fbdbd864dc1ce7780f5ca9b9e9be8f36820315d230584707ada4126b582b243cf60c6db9fa821f570dcea5c1c940d56310e4e84778f297e3305d939fddfbc85186b5cc358509bbe583dc92210f38f98358ada84f395e003c3101c1c218a4ffb88735d298de540279b1dcec5d68f7658ad8b4188c18b406b43c3303b4923a4c241bd994fe0b943578dfb053da0bd1c1e58d8cb1c548bfb087720acac63a6b3972cc882983cb2a9f6a86363b086b0c853cad2a531c1bf1576dd9b778074d0038f616029e7ec54b16a5f84bb38878d63f1a55ce922d2baa490c6281aea3657e75d68c0b571c680c6f9f8eada904882e961c0eee8b6f0469c4f4c650be2ba472f4738ab89b2a017be1da6a3150aa1985f7b68b1765d873817b0c7268e55126069b255576255cf12ae9a6d190a4a792508f83a62900a578566f023683ea2ee95969372344f9826083569e83b691f48809650d6c10a7cbc0d19067bdd4c5c8ff9096a93f401db3d6d0bfd3031de845eeeef1b6c6a8d1a195c84372033331d4a3b3d9dadbc1cd7c041928f86c07693e1225eb54488b1c454c04a42f06b3d05c240a9668c1567abd4490753ecf8af1d280804179cd405e89991e50069edfc788041b910b527ea028bf5f27769207b1e07ab934f301f8f04e55c06259ed105cfafd048ad6b46341967d5600d9b13ed18e968c5af436186693d45181d7723dd39276504213a3d49ef860bcb691304a405411af1b7772ee3635e4e82eaff3b7b4e7a09a537670f123b2d677151d2635ab7538ba7bc689c7dc17b6adce834bfb20b9fac3f206963f3351fe978cdb90ea9e0c4394fcf23f4c498da6277d9b52d244831ff12961e8447484e8a74a9fc3678dae868ec619ad55134d0b1dd86d7815884170122ae8c23361cc24b4205140a8f5fb157817eabec408466f9bfc585600a7463ada76720a15c0a24f08e9270b99d4e0941d8def156aa5b31c44cca640914d0a767f39c8af9fd83cde9b9702e28a3d2f7f6aa569c06b0bb9dcc61464aa96bb441bc7dd50cc96f7fce38b38410a40eb67cbbfea1863662989562ddd72e47c050cf9cfff277c609b32be73bb070ead463f9efb8cef3df6f0b9e9b72a8f49a9528e5449a63179116dfc80fa8e26fba73f2cbedfb5a944021e4f5c2084779fd5d810f3ad9107d1e1e44524254c5d30f500a9e890e000f521af38bbc28b532b4e16437f380886aada774b098701e7cca27d5e0816a7b5794e1ce70564b3bc08a9b9b4b422b41c90d3b10478f5c4a9fd1cbd1a910096d012c3d8da2393b756d42ad7de547fb03a2fb84768cac639800fe7f43050a0e8e282b1e18173df70a7fbd161d4702bc7cd30321d7c84dc18d0c329d63bf86836ff7080406e05210d9b36145fe0e35844812a8ee80fd205bf816b13d5cd6a071b26dbe9dc440087ba3ff5da9d0f726227ab6edd246d19cb6badfdd64f858d3a48cc67dbea35510f7959e6d5354b5a2f07df6ede1eb019112ebc96fb8acd47893da82a6a60c3bce3537b3758a13d3148b66a0c85999ca55cf936b670636f9d4da2c71f3875b896a5fcbf9a048776fa2ba383d493190ff57154bc9d6ca227f29aaf7b75e1105b343737f59f808a1ef95c8c17a79c01f35f1b81daf1b31ef16e30e83ee46deb67b247780fa41ed5b7de84062c104515d771af6e484172371b735071ef877846ed8f48618b53546b14217901d127f736ca28be7f330e8980e86337457422438029995c4990e54c6a474e2351f833d24d642225724d432b0f7558fa43034633d558aace5e1581135a0fa7e179253b9c8b2b4de9aec6d8cabb312c00523c15149040b2e572ab3e4ae0c505c602f76c3f17c8d0e8115ce42305b4b50099c84b7997fb762e76d9535140a59425d9093e2166434ef4245dbc22c06cfc1b6019d0350eefc983cfddb3bb7d5c3e9c741f28bb6a332c51ac0b6ce1432572861ae17ac54d03c71f009d66f0faf77198cc298ce3dd9055c25e329cdead48fdae06d119c5ec5d13e49220afc9c3119fff37ba20c8b20f8dffa4a904a4c7bd47bf85fb4ec07ed09afd039a9657b5b6537bd71ccafec44f75912f2e2dd1b3742bc82f7b1f44de3b2edc7a87dcc73d340b1754d648d448f81e5e0547aca366fc48e4f463bc0bac71f8da7b47781b0a63f4093572bc8d9c9f1ee34f6dfd7644abaf90c4fcd71c1dff0bbd90aa973a9e2c5df3ce826f3290141dcab536d41586d92e3bc67378acae1ceade8348704304e80dfa81c4573388690036afe2ed281eaaadaf4bb5f31a6666ca09331938593132ce23c6cff6f4a227bb3530ccb402400a978769dcfa12f0bb43a6ab93e0a22d9d557a6689bf98766615f5dc9798f1bd4180ae40f693eca79973a93e958b3d1cde90b4181257b26191ba0d1a48911339615f41c757f2958148b58abe3fad8b1bc1e9ea435a8e68cf7341eebaa006397fa85103f64dfdda59f886ac86cfaeb7efacd0b7e0d61720373e57b0b76b3afbb9ac65f4563843333cfa3f966daa65815a45814e1105a9d1e31e216722bcb9af367db465f8bceb027b2ce7806fa2c2698a6525b161ebf30de746bd8af19f3317220163a268f0c6ef5c2a70675a9b823f5dd4fc7f34f946c611d1415d2cc7737fb95de350fec8f82c8c33385e4b31f54837c68b26d587517e46b35079d00ce4f38b5e332060dce38735550d2ee06f1694c846d19a7fd51c11dbc1a455038fb7e656e29def42b2025694ed948bcf2fe8d89651665ab87f18f930f58e9807fab7", 0x1000}, {&(0x7f0000003100)="faf1cde84865a22b1489ebce040f7078fdd460f0135dc9ae", 0x18}, {&(0x7f0000003140)="2a21f0b18d4803ccbd20db6c9792428c20910130f0411d2d8330db6bafbbe5df22ad5cffed5ad689f99c047e4b22e9d16735fe0c58ab9dae7601f543c9fae440724e2d3fa105064a60c527a17d1c2401b9146f658af88c81c2bbaf51f0bd17ae9c7375ddb52e542c802fd24915233812ce67714c2e19b879b0c50ee87a8876ae073ee93ba5b9f1e3f005f33709abbda4a4e27de3ad", 0x95}, {&(0x7f0000003200)="ba5594ccaa1687cc49a739f3e7565023ada46e7e5170e02367468220e85201a3d00f739b521fc364b5849d6ef682970ef882ca2ec6a0289d74d3bbce64dd1fb39ae68bbf9423446dbc5707834401b20fab9a7e60faffc2b24053e97e783cc0c0c4ddeb8d5e6045569fd04519070067b05b0203190c5445f676cd4e8e0708af8d8b569642818d6eda25114e42b19f8114c070d774de59f97a6a60ca3a90a172e9e0acfd9538593d32627b6f5f6c9a73f4a10c833ef953b823edfe6aef288c4861d9c895", 0xc3}], 0x9, &(0x7f00000033c0)=[{0xe8, 0x13689a93a2f0124f, 0xcf5, "9c43e75c546222ae6d0e2a44a16710a0c5dba44cc9201db22270f1bce401092811f6201388992ebcf3cbf68dc2e8115871ce795d5319fb97135ed4aebdd1c1b42a862a8fb2329f1899b73b16bb8bb53bdc6280577f6984848bbaf269c06b9e0cb97a5fe6f4e1716b76b69054bf949b7023ccf010f48c18b1b4dbe7abc772bef8f36e7563048fce0f6ad7396029e031b073cfcf9634df47b1999d9da44b12409a8c41b46d34998beaa27f3dcc6cdec5bd6257d5ad5c23312cf64b618fe1ea83d60d5c9dc2fea89fa90b57012cbaa0cd037760f332b609e234"}], 0xe8}}], 0x3, 0x9e543846078c2780) r4 = dup(r2) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000180)={0x21, @multicast2, 0x4e22, 0x4, 'ovf\x00', 0x29, 0x5, 0x5f}, 0x2c) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r7, 0x0, 0x0) 07:56:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x800454d2, 0x6) 07:56:33 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:33 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="01060000", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={r6, 0xb9, "2a0ddea5850118cb4f917d617af931b24f02432d889c0ccbf8c65774ae300dae3cc4c15aaf652eafe7edc367cdd56d14a2bcb50ab813b0ddd661ae158e14753538d8258c21b1d64d36620bf622482f37866bac9fbaaa0514d84b9477247ea9f9c834413ec27ae8295540533b4ea93b97cbce7ede8a5421a3e86544181c4b193d60f5e5d8c539a3f0327a64600732a6ba36c9f4240233559ee9e8ed68040f30591e842ea92fb4c3e52a0e9bcbf6519c5c46f9e4a01fb1f89fe5"}, &(0x7f0000000340)=0xc1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x2, 0x9, 0x2, 0xfa, 0xffffffff, 0x4fbf1098, 0x7ff, 0x8, r6}, &(0x7f0000000080)=0x20) 07:56:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x80086301, 0x6) 07:56:33 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffff600000) [ 975.939469][T21185] XFS (loop3): Invalid device [.], error=-15 [ 976.055256][T21185] XFS (loop3): Invalid device [.], error=-15 07:56:34 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x80086601, 0x6) 07:56:34 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x111180) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r5, 0x0, 0x0) 07:56:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x6e6f9bd8ce964c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0xffffffffffffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x803) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:34 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x80087601, 0x6) 07:56:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x541, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 07:56:34 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 976.418280][T21217] XFS (loop3): Invalid device [.], error=-15 07:56:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 976.531120][T21217] XFS (loop3): Invalid device [.], error=-15 07:56:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xc0045878, 0x6) 07:56:34 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:34 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xa8) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r5, 0x0, 0x0) [ 976.734472][T21235] kvm [21233]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 07:56:34 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 976.794912][T21242] XFS (loop3): Invalid device [.], error=-15 07:56:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xc0045878, 0x6) [ 976.884472][T21242] XFS (loop3): Invalid device [.], error=-15 07:56:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x62000) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) dup(r3) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xffffffffffffff7e, 0x0, 0x0, 0x0) 07:56:35 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) inotify_init() r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r5, 0x0, 0x0) 07:56:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xc0189436, 0x6) 07:56:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) timer_create(0x1, &(0x7f0000000280)={0x0, 0x12, 0x2, @thr={&(0x7f0000000180)="410cc2668566377651e78dbd42f12636216ceb153b27056da7518a3c8787bd611126b700f1061893c8a7972ed57f4506db816c95c16b22b460571df9fe026fab2bded66c2d7b24574b6d26408c2cded9eced5da060922e4ff1e7c6a876b147e4f6d015c5944af5801fe874753334f89f7f9a7a97f4a6f3799b96e14c5be8a02dcd7b615efa23a67176b98fa59e0504254a190672fc7fa7cc855a4cb3ff9940a9971a2673c978d8005f2d46e468d56d9617ab6e0f80c38d886b989a2dc036be33875118f7c55dac3abe04e9f6ba144b08335fb92662cb54d054f4c7dcf85f5426d4e9a74a", &(0x7f0000000040)="34460a4eea1e2e83dc55a759cee7dc71252af5118523066a238f472a9fdf489971be8d91bb1865e2e18d784205447e5be35c1815916c513f25b8e5dd094ae5c1f2705034262100e80c7ac72bf861f43a96af2506fc424e404c07ae8c7e76dd7045f378f9aa5d9c0c4e06e55db6ff4e09b8f18915294be11dda8094b4aa80333034f567ada08a61428cb90f58bfd5d1ceca9442655e52fff33872c40e367b208a1820b230751a2f"}}, &(0x7f00000002c0)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x100000, 0x0) read$char_usb(r1, &(0x7f0000000340)=""/13, 0xd) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:35 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xff', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 977.214067][T21269] XFS (loop3): Invalid device [.], error=-15 07:56:35 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xff', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xc020660b, 0x6) [ 977.311858][T21269] XFS (loop3): Invalid device [.], error=-15 07:56:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20080, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r5, 0x0, 0x0) 07:56:35 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:35 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xff', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x8}, 0x1}, 0x9b) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000180)={0x0, 0xe2, &(0x7f0000000080)={&(0x7f0000005800)={0x58, r5, 0x121, 0x0, 0x0, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x3d6}}}]}}]}, 0x58}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x4c}}, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @multicast1}, &(0x7f00000000c0)=0xc) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r15}]]}}}]}, 0x4c}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'bond_slave_0\x00', r15}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r20}]]}}}]}, 0x4c}}, 0x0) r21 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r22 = socket$netlink(0x10, 0x3, 0x0) r23 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r23, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r23, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r22, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r24}]]}}}]}, 0x4c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r21, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r24}) r25 = socket$alg(0x26, 0x5, 0x0) bind$alg(r25, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r25, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r26 = accept$alg(r25, 0x0, 0x0) r27 = dup(r26) write$UHID_DESTROY(r27, &(0x7f0000000080), 0xfff2) recvmmsg(r27, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) getsockname$packet(r27, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001740)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001a00)={&(0x7f0000001780)={0x244, r5, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0x1e0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0x3, 0xff, 0x6}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x380}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r24}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}]}}]}, 0x244}, 0x1, 0x0, 0x0, 0x1}, 0x10) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) madvise(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0xb) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 07:56:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xc040565e, 0x6) [ 977.594060][T21292] XFS (loop3): Invalid device [.], error=-15 [ 977.647195][T21300] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 07:56:35 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 977.697984][T21300] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 977.750181][T21292] XFS (loop3): Invalid device [.], error=-15 07:56:35 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xfc', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000005400)=[{{&(0x7f0000000300)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast2}}, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/36}, {&(0x7f0000000380)=""/103}, {&(0x7f0000000280)=""/49}], 0x0, &(0x7f0000000440)=""/173}, 0x3f}, {{&(0x7f0000000500)=@generic, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000000580)=""/152}, {&(0x7f0000000640)=""/231}, {&(0x7f0000000740)=""/205}, {&(0x7f0000000880)=""/4096}, {&(0x7f0000001880)=""/136}, {&(0x7f0000001940)=""/4096}, {&(0x7f0000002940)=""/203}, {&(0x7f0000002a40)=""/216}, {&(0x7f0000002b40)=""/4096}, {&(0x7f0000003b40)=""/106}], 0x0, &(0x7f0000003c80)=""/47}, 0x9}, {{&(0x7f0000003cc0)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000005080)=[{&(0x7f0000003d40)=""/106}, {&(0x7f0000003dc0)=""/36}, {&(0x7f0000003e00)=""/4096}, {&(0x7f0000004e00)=""/76}, {&(0x7f0000004e80)=""/110}, {&(0x7f0000004f00)=""/111}, {&(0x7f0000004f80)=""/134}, {&(0x7f0000005040)=""/17}], 0x0, &(0x7f0000005100)=""/12}, 0x1}, {{&(0x7f0000005140)=@alg, 0x0, &(0x7f0000005300)=[{&(0x7f00000051c0)=""/231}, {&(0x7f00000052c0)=""/63}], 0x0, &(0x7f0000005340)=""/175}, 0x9e5}], 0x1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000040)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) openat(r7, &(0x7f0000000840)='./file0\x00', 0x100000, 0x40) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r8, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, 0x0, &(0x7f0000000040)) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r9, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r9, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000002c0), 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r10, 0x0, 0x0) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r14 = dup2(r13, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[]}}, 0x800) 07:56:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2) 07:56:35 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:36 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xf6', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 977.930926][T21300] netlink: 'syz-executor.4': attribute type 13 has an invalid length. 07:56:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 07:56:36 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\xfe', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 978.062913][T21320] XFS (loop3): Invalid device [.], error=-15 [ 978.083220][T21294] netlink: 'syz-executor.4': attribute type 13 has an invalid length. 07:56:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3) [ 978.191548][T21320] XFS (loop3): Invalid device [.], error=-15 [ 978.367765][T21300] netlink: 'syz-executor.4': attribute type 13 has an invalid length. [ 978.439517][T21306] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 978.478477][T21306] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 978.499084][T21337] netlink: 'syz-executor.4': attribute type 13 has an invalid length. [ 978.659330][T21294] netlink: 'syz-executor.4': attribute type 13 has an invalid length. [ 978.681061][T21300] netlink: 'syz-executor.4': attribute type 13 has an invalid length. 07:56:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4) 07:56:36 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:36 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000000)={0x7, {0x4, 0x0, 0x4, 0xb479eeab}}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 07:56:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) ptrace$peekuser(0x3, r4, 0x9) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000002c0), 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r6, 0x0, 0x0) 07:56:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x19dd30610b8f1348, 0x0, 0x80, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = epoll_create(0x3) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='ode\x8c\xb7\xe3\xe7m\x00', 0x200000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x4, r6, &(0x7f00000001c0)="de460b95beb64523ff49dddb2178e0e8a45c5470fa8d62effe52a6b505bb0cb0c80d773a55422735f1f70ad1a71b78d4f677ec3fb43cc0d458e2e725fc73cbfbf8a19fe95da303f246c47181b332fcc78dd83856ae1b98836f1021e6f214a6026bb71a6efe425362865f55b58c14819bfe95b9296a30a70b9014629f00d9ce65f06146c9ef2eea4d6621ad1312e14fb21012d90ae87ffc962f5de73cf754aba18ae350b7d2f059", 0xa7, 0x8000, 0x0, 0x2, r11}, &(0x7f00000000c0)) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r13 = ioctl$KVM_CREATE_VM(r12, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) poll(&(0x7f0000000040)=[{r2, 0x40}, {r3, 0x8643beb00a7dcc8d}, {r5, 0x40}, {0xffffffffffffffff, 0x20}, {r7, 0x2}, {r8, 0x1371}, {r13, 0x20}], 0x7, 0x2) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r14 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r14, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0xd8}, 0xffff}, 0x5c) getsockopt$bt_l2cap_L2CAP_OPTIONS(r14, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x7) [ 979.034598][T21368] XFS (loop3): Invalid device [.], error=-15 07:56:37 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 979.182719][T21368] XFS (loop3): Invalid device [.], error=-15 07:56:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x8) 07:56:37 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:37 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x80, &(0x7f0000000280)=""/245, &(0x7f00000000c0)=0xf5) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/166, 0xa6}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0x200039b0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000040)='cpuset\x00', &(0x7f0000000080)='/dev/kvm\x00', 0x0) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 07:56:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getitimer(0x3, &(0x7f00000001c0)) llistxattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000023, 0x0, 0x40000080], [0xc1]}) open_by_handle_at(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180007e6296cecb65c912802563171"], 0x40000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r1, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x1, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000002c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r10 = accept$alg(r9, 0x0, 0x0) r11 = dup(r10) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000009d80), 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r11, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) connect$bt_l2cap(r8, 0x0, 0x0) 07:56:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x9) [ 979.512914][T21387] XFS (loop3): Invalid device [.], error=-15 07:56:37 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa) 07:56:37 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) 07:56:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) dup(0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {}, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 07:56:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x8, &(0x7f0000000800)=[{&(0x7f0000000280)="69b12cd2014771b9cff7e191ebcfe168005ec7879d39cce5addf5abd6e6e68182975eff0a2499633740592a5bb8bc200e20c180d7bffc9ee934c17d09c7b60e88b54cf65508f33bbe16018f754395a07b58fa9d8d5af6d8cbee90ffb0f8e47a0c66c391d08fe217694b0b0122714aa904da68c96bac2bec240001e06cb2705ad336218df6853b7211e62f7568097f1a54a59abb118be69dd77a5f9325d6e7e95c39f234d935f5ba3ed9cb15aa82488f1fd5368f2d69d8d9ef230170e41f8b7165bbab21ff56e6c66", 0xc8, 0x5}, {&(0x7f0000000380)="56c7b3c006c8a94364087184fb3e6c42a4aee02adbf7426da0a37e5b5a2c1eb14f497366a2abb21238c386a99f1f995a27fd254616dfb1c91f3a723c38019b2b82110554c95723bd563fadd403a0766497e177e3db1c8943b15182c0494e2a71b7cb1ac39a220ed175af3dfce08d710dc051b07bf0b9723fa2768f6d539cd5d169afde516115406b3acc1787e4f0192da60ca3b659f647acd864f94e9dc6e043b9743dd829433f2361b8a2d13db8ba84a48e48f46c1ccaef6ca7e721e93f6aa913460db32570e862b19e2be65541f6f65e191b44d64bcf59ac", 0xd9, 0x7}, {&(0x7f0000000480)="9295c090b822e2191ce6c6b81b834b6ebaa68cb87026818e759528342f572b82d58555bb6344d1b01963ff53189c283b518871175acf99d25d27c2fd029de32dfeaa2dfaf5d437c384240d2510815d12d1e7e7ac89a6be0acb0827a66596f391dae8ceeab0f29f3410134c278c86c245dd737c3c22418a790a4915164246642125d6c1032d77412d6fb70e1a185403beb9709861988940e9f02b62773a27eaf481e41845f0bdad", 0xa7, 0x7648}, {&(0x7f0000000540)="dcb052a987fa3a32aea873b3d1812e05d42a5492c22d5ab8bfb6", 0x1a, 0x2}, {&(0x7f0000000580)="2e7b72d97298674a478dc97bba66b0a755706be6b883b9bfb8be65a0533467167203b5a3a44312b7223a8f9cfdabedc3f31986b95b189511aa6443319b6effcedd99b74459aecc96d8e02f2edcbc6133227333e544cf75b32fff565dd8b6379d3423b6", 0x63, 0x2cc3}, {&(0x7f0000000600)="ab332230193976490321f55a711c78f09dce7a8e552fdbb120d668cd35094f0f254fda8227345cfcfc1f36e75d4d0aed949aeddf1f5e05b3a742dbaa7c60180d90348204cb85ef817bcd1154ae8909cf05009cfb6fe5e2d1ee126946370652072cd73b0c4b9c78ac76d40197d38212f1a72b2f24a287cd323622ba5cae6759af416ea50876", 0x85, 0x1f}, {&(0x7f00000006c0)="6863a6e9af47ddd6747edd790805e77de6c487f1fe508a44", 0x18}, {&(0x7f0000000700)="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", 0xfe, 0x4}], 0x40008, &(0x7f00000008c0)='@nodev\xbd\x00') r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000001340)={0x5, &(0x7f0000001040)=[{}, {}, {}, {}, {}]}) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x6}) msync(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xffffff4e, 0x0, 0x0, 0x6f) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) write$binfmt_elf64(r0, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x1, 0x5, 0x9, 0xffffffff, 0x2, 0x6, 0xdc0, 0xc6, 0x40, 0x28f, 0xfffffff8, 0x8, 0x38, 0x2, 0x4, 0x3f, 0x9}, [{0x70000000, 0x7, 0x36a, 0x10, 0xdee5, 0x81, 0x5, 0x10000}], "8c14e7e6383ad342cab1cc2482778e4aa10ee589dc46e258f3f45afc88c95b8916285264a00a0597e59653f295ad71fb80c98a3f225a082ba23700d601ae825d6c8271edf46153f881b7db4240c1a4860c6adc353ef63eca635bad632f98f4d6240920ab4f86e571d6d1e4004b5481bedd8b0da4916cc9e7b785e2b39385cc8188ee784317d14cf7674d3991318ec0d686210e6ac387ce883986037b0b732bdeae496e4970876d", [[], [], [], [], [], []]}, 0x71f) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) 07:56:37 executing program 2: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='logdev=.']) [ 979.912625][T21406] XFS (loop3): Invalid device [.], error=-15 07:56:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x0