0, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r1, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:11 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 338.146275] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 338.146275] êCH]. [ 338.390925] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:12 executing program 0: r0 = getpgid(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:12 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 338.663174] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 338.895327] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 338.895327] êCH]. [ 338.998608] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:13 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:14 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r1, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:14 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x15) r1 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:14 executing program 0: r0 = getpgid(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:14 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x15) r1 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 340.639738] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 340.639738] êCH]. [ 340.662545] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 340.662545] êCH]. [ 340.737819] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 340.807990] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:14 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x15) r1 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 341.137441] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:15 executing program 4: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:15 executing program 0: r0 = getpgid(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:15 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:15 executing program 3: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:15 executing program 4: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 341.777040] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 341.777040] êCH]. 08:33:15 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 341.859582] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:15 executing program 4: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 341.938854] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 341.938854] êCH]. 08:33:16 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:16 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r1, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 342.434361] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:16 executing program 3: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:16 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 343.311759] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 343.328179] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 343.328179] êCH]. [ 343.340532] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 343.340532] êCH]. 08:33:17 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:17 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 343.590171] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 343.590171] êCH]. 08:33:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 344.281425] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:33:19 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:19 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r1, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:19 executing program 3: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:19 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:19 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 08:33:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 345.315503] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 345.315503] êCH]. [ 345.324972] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 345.324972] êCH]. [ 345.450639] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 345.469518] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 345.469518] êCH]. 08:33:19 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) [ 345.579606] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:19 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 08:33:19 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 345.897555] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present 08:33:19 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 346.130872] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present 08:33:20 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, 0x0, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:20 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:20 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r1, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:20 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 346.470698] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present 08:33:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 346.644978] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 346.644978] êCH]. [ 346.793461] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 346.825774] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 346.825774] êCH]. 08:33:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 346.926252] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:21 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 347.202700] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 347.202700] êCH]. 08:33:21 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:21 executing program 0: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:21 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 347.523092] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 347.523092] êCH]. [ 347.547280] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 347.547280] êCH]. [ 347.635465] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:21 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, 0x0, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:21 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:21 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:21 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:21 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:22 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:22 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:22 executing program 0: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 348.497600] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 348.497600] êCH]. [ 348.526332] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 348.819358] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 348.819358] êCH]. [ 348.834514] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 348.834514] êCH]. 08:33:23 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:23 executing program 0: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:23 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:23 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 349.280562] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 349.280562] êCH]. 08:33:23 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, 0x0, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 349.434635] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 349.434635] êCH]. [ 349.487691] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 349.487691] êCH]. [ 349.514068] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 349.514068] êCH]. [ 349.839373] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 349.958483] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:24 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 350.142553] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 350.142553] êCH]. 08:33:24 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:24 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, 0x0, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 350.461637] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 350.461637] êCH]. [ 350.606525] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 350.606525] êCH]. 08:33:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:24 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 350.800379] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 350.800379] êCH]. 08:33:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 08:33:25 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:25 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 351.182364] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 351.182364] êCH]. [ 351.217919] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 351.308277] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 351.455033] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 351.455033] êCH]. [ 351.545031] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 351.545031] êCH]. 08:33:26 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:33:26 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:26 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 352.411112] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 352.411112] êCH]. 08:33:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:33:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:26 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 352.902524] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:27 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 353.470701] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 353.470701] êCH]. 08:33:27 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:27 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 354.595838] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:28 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:28 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:28 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 354.917202] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 354.917202] êCH]. [ 355.318098] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 355.318098] êCH]. [ 355.350085] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:29 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:29 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:29 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, 0x0, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:29 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 355.932197] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 355.989568] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 355.989568] êCH]. [ 356.112687] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 356.112687] êCH]. 08:33:30 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 356.159406] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 356.159406] êCH]. [ 356.527052] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:30 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:30 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 356.805511] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 356.933489] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 356.933489] êCH]. 08:33:31 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:33:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 357.465740] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 357.530558] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 357.530558] êCH]. [ 357.541258] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 357.541258] êCH]. 08:33:31 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 357.701347] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 357.701347] êCH]. 08:33:31 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:31 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:31 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 358.014417] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 358.014417] êCH]. 08:33:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) [ 358.854822] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:32 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:32 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:33 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:33 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:33 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 359.802427] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 359.802427] êCH]. [ 360.267082] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 360.419496] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 360.419496] êCH]. 08:33:34 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 360.503451] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 360.503451] êCH]. [ 360.619918] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 360.794849] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 360.794849] êCH]. [ 360.965687] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 360.965687] êCH]. 08:33:35 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:35 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 361.123924] Bluetooth: hci1: command 0x0406 tx timeout 08:33:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:33:35 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) [ 361.496295] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 361.496295] êCH]. [ 361.510973] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 361.510973] êCH]. 08:33:35 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 362.056287] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 362.056287] êCH]. 08:33:36 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:36 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 362.340123] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 362.340123] êCH]. [ 362.642100] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:36 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 362.831019] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 362.831019] êCH]. 08:33:37 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:37 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 363.408371] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 363.408371] êCH]. [ 363.618775] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 363.618775] êCH]. 08:33:37 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:37 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 363.849383] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 363.849383] êCH]. 08:33:37 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:38 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:38 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 364.388669] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 364.408398] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 364.408398] êCH]. [ 364.425480] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 364.425480] êCH]. [ 364.480474] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 364.480474] êCH]. 08:33:38 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:38 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 364.917349] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 364.984380] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 364.984380] êCH]. [ 365.016826] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 365.016826] êCH]. [ 365.411777] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 365.411777] êCH]. 08:33:39 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:39 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 365.639561] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 365.639561] êCH]. [ 365.713014] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 365.713014] êCH]. 08:33:40 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:40 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 366.234761] Bluetooth: hci5: command 0x0406 tx timeout [ 366.331674] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:40 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:40 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:40 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 366.786980] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 366.826320] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 366.826320] êCH]. [ 366.999539] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 366.999539] êCH]. [ 367.034791] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:41 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:41 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:41 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 367.654778] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 367.654778] êCH]. [ 367.658196] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:41 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:41 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:42 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 368.316688] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:42 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 368.722897] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:43 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:43 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:43 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:43 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 370.319457] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:44 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 370.659294] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:44 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 371.171758] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 371.171758] êCH]. 08:33:45 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:45 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:45 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 372.107669] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 372.107669] êCH]. 08:33:46 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 372.179934] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 372.179934] êCH]. 08:33:46 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:46 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 373.208593] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 373.208593] êCH]. [ 373.230774] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:47 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 373.394246] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:47 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:47 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 374.026802] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 374.029299] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 374.029299] êCH]. 08:33:48 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) [ 374.259001] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 374.259001] êCH]. 08:33:48 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 374.777278] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:48 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 374.908324] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 374.908324] êCH]. 08:33:48 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 375.138640] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:49 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 375.265353] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 375.265353] êCH]. 08:33:49 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 375.479830] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 375.479830] êCH]. 08:33:49 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 375.716930] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 375.716930] êCH]. 08:33:49 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:49 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 375.944819] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 376.068867] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 376.078190] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 376.078190] êCH]. 08:33:50 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 376.181564] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 376.181564] êCH]. [ 376.470130] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 376.470130] êCH]. [ 376.697430] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:51 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:51 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 377.419589] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 377.419589] êCH]. 08:33:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:51 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 377.900835] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:51 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:33:52 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:52 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 379.073775] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 379.073775] êCH]. [ 379.119385] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:53 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:53 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 379.251802] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:53 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 379.664170] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.669793] ieee802154 phy1 wpan1: encryption failed: -22 08:33:53 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 379.996908] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 379.996908] êCH]. 08:33:54 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:54 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:33:54 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) [ 380.582444] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 380.582444] êCH]. [ 380.757923] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 381.097545] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:33:55 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:55 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:55 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) 08:33:55 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 382.047514] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 382.047514] êCH]. 08:33:56 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 382.643090] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 382.757492] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 382.757492] êCH]. [ 382.774990] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 382.774990] êCH]. 08:33:56 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:57 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:57 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 383.782603] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 383.782603] êCH]. 08:33:58 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:58 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 384.530654] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 385.151774] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 385.151774] êCH]. 08:33:59 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:59 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:59 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:59 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:33:59 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:00 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 386.732531] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:00 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:00 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 386.915415] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 386.915415] êCH]. 08:34:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:34:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x15) r3 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 387.164752] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 387.164752] êCH]. [ 387.258861] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:01 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:34:01 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:34:02 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x15) r3 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:34:02 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) 08:34:02 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 388.320728] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 388.320728] êCH]. [ 388.448579] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 388.737625] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 388.737625] êCH]. 08:34:02 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 389.065026] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 389.090819] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 389.090819] êCH]. 08:34:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x15) r3 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:34:03 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:03 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 389.401700] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:03 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 390.018955] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 390.018955] êCH]. 08:34:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 08:34:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) [ 390.188109] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 390.188109] êCH]. [ 390.437136] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 390.437136] êCH]. [ 390.438050] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 390.438050] êCH]. 08:34:04 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:04 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 390.494503] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:04 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:04 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 390.899473] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 390.899473] êCH]. [ 391.047843] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 391.171474] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:05 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:05 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:06 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:06 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:06 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 392.270160] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 392.270160] êCH]. 08:34:06 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:06 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 392.841660] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 392.841660] êCH]. [ 392.871482] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 393.289967] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 393.289967] êCH]. 08:34:07 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:07 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:07 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:07 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:07 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:07 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 394.327178] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 394.327178] êCH]. [ 394.505610] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 394.505610] êCH]. [ 394.552760] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 394.552760] êCH]. [ 394.616482] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:09 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 395.015115] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 395.015115] êCH]. [ 395.029133] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 395.029133] êCH]. 08:34:09 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 395.179979] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 395.360508] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 395.360508] êCH]. 08:34:09 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:09 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:09 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 395.852441] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:10 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 396.178612] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 396.357552] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 396.357552] êCH]. 08:34:10 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 396.438454] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 396.438454] êCH]. 08:34:10 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 397.274188] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:11 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:11 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:11 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:11 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:11 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 398.048320] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 398.048320] êCH]. [ 398.083833] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 398.083833] êCH]. 08:34:12 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 398.505466] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 398.578402] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 398.578402] êCH]. [ 398.681122] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 398.681122] êCH]. [ 398.709773] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:12 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:13 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 399.108876] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 399.447221] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 399.447221] êCH]. 08:34:14 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 400.064824] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 400.064824] êCH]. 08:34:14 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:14 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:14 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:14 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:14 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 400.717734] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 400.717734] êCH]. [ 400.734493] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 400.734493] êCH]. [ 400.880290] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 401.043305] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 401.355174] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 401.355174] êCH]. [ 401.493987] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 401.602938] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 401.602938] êCH]. [ 401.777289] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 401.777289] êCH]. 08:34:15 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:16 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:16 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) [ 402.418918] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 402.418918] êCH]. 08:34:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:34:16 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:17 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:17 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:17 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:17 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:18 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 404.022060] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 404.118291] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 404.129789] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 404.129789] êCH]. 08:34:18 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:34:18 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 404.713779] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 404.713779] êCH]. 08:34:18 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 405.208070] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 405.208070] êCH]. 08:34:19 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 405.251052] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:19 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:19 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 405.424398] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 405.438083] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 405.438083] êCH]. 08:34:19 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 405.627670] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 405.627670] êCH]. 08:34:19 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 405.884050] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 405.884050] êCH]. 08:34:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) [ 406.045184] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:20 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 406.688339] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:20 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:20 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 406.764878] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 406.764878] êCH]. 08:34:20 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 406.906147] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 406.906147] êCH]. 08:34:20 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:21 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 407.438086] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 407.584335] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 407.584335] êCH]. 08:34:21 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 407.774677] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 407.774677] êCH]. 08:34:21 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:22 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:22 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 408.218880] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 408.218880] êCH]. 08:34:22 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:22 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 408.783923] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:23 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 409.324184] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:23 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:23 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:23 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 410.188172] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 410.188172] êCH]. 08:34:24 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 410.455226] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:24 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:24 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 410.892162] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 410.892162] êCH]. 08:34:25 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 411.824620] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 411.824620] êCH]. 08:34:25 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:25 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:25 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 412.091229] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 412.091229] êCH]. 08:34:26 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:26 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:27 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:27 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r0 = socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 413.139732] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 413.339452] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 413.339452] êCH]. 08:34:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:34:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:34:28 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 414.214433] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 414.214433] êCH]. 08:34:28 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:28 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:28 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:28 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:28 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 414.838222] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 415.192569] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 415.192569] êCH]. [ 415.461656] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:29 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:29 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:29 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 415.736320] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 415.736320] êCH]. 08:34:29 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 415.993761] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 415.993761] êCH]. [ 416.468650] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:30 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:30 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:30 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 417.902833] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:31 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:32 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:32 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:32 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:32 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 418.753705] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 418.753705] êCH]. [ 419.004067] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 419.503264] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 419.503264] êCH]. 08:34:33 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:33 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:33 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:33 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 420.115754] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 420.115754] êCH]. 08:34:34 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 420.332760] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 420.623987] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 420.623987] êCH]. [ 420.643163] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 420.643163] êCH]. 08:34:34 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:34 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 421.044482] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:35 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x15) r3 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) [ 421.597283] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 421.597283] êCH]. [ 421.660428] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 421.660428] êCH]. [ 421.979995] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 421.979995] êCH]. 08:34:36 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:36 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:36 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:36 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:36 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:37 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 423.472962] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 423.472962] êCH]. [ 423.802217] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 423.802217] êCH]. [ 424.079431] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:38 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x0, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 424.128562] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 424.128562] êCH]. 08:34:38 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:38 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:38 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x15) r3 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:34:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x15) r3 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) 08:34:39 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x0, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 425.179405] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 425.179405] êCH]. [ 425.408684] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 425.408684] êCH]. [ 425.524681] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:39 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:39 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) 08:34:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 08:34:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 08:34:40 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x0, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 426.307017] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:34:40 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:41 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:41 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 427.570035] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 427.583707] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 427.583707] êCH]. 08:34:41 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x0, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:41 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x0, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:41 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x0, 0x0, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:42 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:42 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 429.044017] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 429.044017] êCH]. 08:34:43 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x0, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 429.180629] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:43 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) [ 429.705075] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 429.705075] êCH]. 08:34:44 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 430.189744] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:44 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x0, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:44 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x0, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:44 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:45 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x0, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 431.589005] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 431.791065] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 431.791065] êCH]. 08:34:46 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x0, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:46 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:46 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x0, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:47 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:47 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:47 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:47 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x0, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 434.112428] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:48 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:48 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:48 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 434.894572] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 434.894572] êCH]. [ 434.912368] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 434.912368] êCH]. 08:34:48 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x0, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 435.315512] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:49 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:49 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 08:34:49 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x0, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 436.016088] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 436.016088] êCH]. 08:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 436.416149] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 436.416149] êCH]. 08:34:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) 08:34:50 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x0, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:50 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:50 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:50 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:34:50 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x0, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 437.340495] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:51 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x0, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') perf_event_open(0x0, 0x0, 0xf, r3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 438.161833] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 438.161833] êCH]. 08:34:52 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x0, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') perf_event_open(0x0, 0x0, 0xf, r3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 08:34:53 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 439.061752] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 439.061752] êCH]. 08:34:53 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) socket(0x0, 0x0, 0x10000000000002) [ 439.659363] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:53 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:54 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:54 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:54 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:54 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:54 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 441.062060] ieee802154 phy0 wpan0: encryption failed: -22 [ 441.067748] ieee802154 phy1 wpan1: encryption failed: -22 [ 441.498932] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 441.498932] êCH]. [ 441.513200] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 441.513200] êCH]. [ 441.699449] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 441.699449] êCH]. 08:34:55 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:56 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:56 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:56 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 442.218793] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 442.295949] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 442.295949] êCH]. [ 442.302414] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 442.302414] êCH]. 08:34:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') perf_event_open(0x0, 0x0, 0xf, r3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 442.600026] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:34:56 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:56 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:56 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:56 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:57 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x0, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) [ 443.760779] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 443.760779] êCH]. [ 443.888673] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 443.919571] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 443.919571] êCH]. [ 443.961906] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 443.961906] êCH]. 08:34:58 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 444.008247] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 444.008247] êCH]. 08:34:58 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x0, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:58 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x0, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:58 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:58 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 444.734129] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 444.734129] êCH]. [ 445.023534] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 445.199035] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 445.199035] êCH]. 08:34:59 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:34:59 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 445.523195] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 445.523195] êCH]. 08:34:59 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:34:59 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x0, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 445.657347] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 445.657347] êCH]. 08:34:59 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 445.864949] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 445.864949] êCH]. [ 445.888495] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 445.888495] êCH]. 08:34:59 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 445.970988] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 446.201684] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 446.201684] êCH]. [ 446.223111] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 446.223111] êCH]. 08:35:00 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:00 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:35:00 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 446.539709] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 446.539709] êCH]. 08:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) 08:35:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') perf_event_open(0x0, 0x0, 0xf, r3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) [ 447.141372] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 447.141372] êCH]. [ 447.339998] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:01 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:35:01 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:01 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 447.714064] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 447.714064] êCH]. 08:35:01 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:35:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(r0, &(0x7f0000000240)=@l2tp6, &(0x7f0000000040)=0x80, 0x800) open_by_handle_at(r1, &(0x7f00000001c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x4, 0x200}}, 0x66080) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') perf_event_open(0x0, 0x0, 0xf, r3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 08:35:02 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:35:02 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:02 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x37, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) r4 = socket(0x0, 0x0, 0x10000000000002) sendmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) 08:35:02 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) write$binfmt_misc(r5, &(0x7f0000000880)=ANY=[], 0x4b) [ 448.723777] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 448.723777] êCH]. 08:35:03 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) write$binfmt_misc(r5, &(0x7f0000000880)=ANY=[], 0x4b) 08:35:03 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:35:03 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 449.515108] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:03 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 450.039356] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:04 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 450.343542] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 450.343542] êCH]. 08:35:04 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:04 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:05 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:05 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:05 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 451.281376] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:05 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 452.129411] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:06 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 452.593136] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 452.593136] êCH]. 08:35:06 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 452.797031] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 452.797031] êCH]. 08:35:06 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:06 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:06 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 453.078185] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 453.078185] êCH]. 08:35:07 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, 0x0, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 453.460148] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 453.786021] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 453.786021] êCH]. [ 453.859461] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:08 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:08 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:08 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:08 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:08 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 454.392101] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 454.392101] êCH]. [ 454.535203] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 454.535203] êCH]. [ 454.725797] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:08 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:09 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:09 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 455.500176] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:09 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:35:10 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:10 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:10 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:10 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 456.668057] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:11 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:11 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 457.165810] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 457.165810] êCH]. 08:35:11 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 457.295363] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 457.295363] êCH]. 08:35:11 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 457.748764] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:11 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:11 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x0, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 457.959749] XFS (loop1): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 457.959749] êCH]. [ 457.977463] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 458.004974] XFS (loop4): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 458.004974] êCH]. 08:35:12 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:35:12 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:13 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x0, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 459.275921] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 459.275921] êCH]. [ 459.295684] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 459.295684] êCH]. 08:35:13 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:35:13 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:13 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:13 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) write$binfmt_misc(r5, &(0x7f0000000880)=ANY=[], 0x4b) [ 459.580091] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 459.580091] êCH]. [ 459.827629] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:13 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 460.051511] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present 08:35:14 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x0, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 460.103535] XFS (loop5): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 460.103535] êCH]. 08:35:14 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) keyctl$revoke(0x3, 0x0) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:35:14 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x0, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:14 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) (fail_nth: 1) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 08:35:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 1) [ 461.108389] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 461.108389] êCH]. 08:35:15 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x0, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:15 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 461.185766] FAULT_INJECTION: forcing a failure. [ 461.185766] name failslab, interval 1, probability 0, space 0, times 1 [ 461.300901] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 461.328848] CPU: 0 PID: 5542 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 461.328872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 461.328877] Call Trace: [ 461.328899] dump_stack+0x1fc/0x2ef [ 461.328919] should_fail.cold+0xa/0xf [ 461.328937] ? setup_fault_attr+0x200/0x200 [ 461.328952] ? lock_acquire+0x170/0x3c0 [ 461.328973] __should_failslab+0x115/0x180 [ 461.328990] should_failslab+0x5/0x10 [ 461.329003] kmem_cache_alloc_trace+0x284/0x380 [ 461.329016] ? lock_acquire+0x170/0x3c0 [ 461.329031] gsmld_open+0x9e/0x7e0 [ 461.329043] ? gsmld_close+0x1f0/0x1f0 [ 461.329055] tty_ldisc_open+0x81/0xc0 [ 461.329068] tty_set_ldisc+0x2d2/0x650 [ 461.329085] tty_ioctl+0xb4b/0x1630 [ 461.329101] ? tty_fasync+0x300/0x300 [ 461.329116] ? get_pid_task+0xf4/0x190 [ 461.329130] ? mark_held_locks+0xf0/0xf0 [ 461.329147] ? perf_trace_lock_acquire+0xef/0x530 [ 461.329166] ? HARDIRQ_verbose+0x10/0x10 [ 461.329180] ? ksys_write+0x241/0x2a0 [ 461.329194] ? tty_fasync+0x300/0x300 [ 461.329208] do_vfs_ioctl+0xcdb/0x12e0 [ 461.329222] ? lock_downgrade+0x720/0x720 [ 461.329236] ? check_preemption_disabled+0x41/0x280 [ 461.329250] ? ioctl_preallocate+0x200/0x200 [ 461.329267] ? __fget+0x356/0x510 [ 461.329283] ? do_dup2+0x450/0x450 [ 461.329294] ? vfs_write+0x393/0x540 [ 461.329308] ? fput+0x2b/0x190 [ 461.329327] ksys_ioctl+0x9b/0xc0 [ 461.329343] __x64_sys_ioctl+0x6f/0xb0 [ 461.329356] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 461.329368] do_syscall_64+0xf9/0x620 [ 461.329386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.329396] RIP: 0033:0x7fc113d9d639 [ 461.329409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 461.329417] RSP: 002b:00007fc112310168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.329429] RAX: ffffffffffffffda RBX: 00007fc113ebdf80 RCX: 00007fc113d9d639 08:35:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) (fail_nth: 2) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 461.329436] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000006 [ 461.329443] RBP: 00007fc1123101d0 R08: 0000000000000000 R09: 0000000000000000 [ 461.329451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.329458] R13: 00007ffeaa82c4ef R14: 00007fc112310300 R15: 0000000000022000 08:35:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x2, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 462.066437] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 462.066437] êCH]. [ 462.131689] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 462.131689] êCH]. [ 462.163669] FAULT_INJECTION: forcing a failure. [ 462.163669] name failslab, interval 1, probability 0, space 0, times 0 [ 462.191812] CPU: 1 PID: 5593 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 462.199625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 462.208981] Call Trace: [ 462.211578] dump_stack+0x1fc/0x2ef [ 462.215239] should_fail.cold+0xa/0xf [ 462.219056] ? setup_fault_attr+0x200/0x200 [ 462.223476] ? lock_acquire+0x170/0x3c0 [ 462.227457] __should_failslab+0x115/0x180 [ 462.231687] should_failslab+0x5/0x10 [ 462.235479] kmem_cache_alloc_trace+0x284/0x380 [ 462.240134] gsmld_open+0xe5/0x7e0 [ 462.243658] ? gsmld_close+0x1f0/0x1f0 [ 462.247534] tty_ldisc_open+0x81/0xc0 [ 462.251328] tty_set_ldisc+0x2d2/0x650 [ 462.255204] tty_ioctl+0xb4b/0x1630 [ 462.258821] ? tty_fasync+0x300/0x300 [ 462.262611] ? get_pid_task+0xf4/0x190 [ 462.266484] ? mark_held_locks+0xf0/0xf0 [ 462.270535] ? perf_trace_lock_acquire+0xef/0x530 [ 462.275381] ? HARDIRQ_verbose+0x10/0x10 [ 462.279428] ? ksys_write+0x241/0x2a0 [ 462.283218] ? tty_fasync+0x300/0x300 [ 462.287006] do_vfs_ioctl+0xcdb/0x12e0 [ 462.290878] ? lock_downgrade+0x720/0x720 [ 462.295012] ? check_preemption_disabled+0x41/0x280 [ 462.300013] ? ioctl_preallocate+0x200/0x200 [ 462.304411] ? __fget+0x356/0x510 [ 462.307848] ? do_dup2+0x450/0x450 [ 462.311370] ? vfs_write+0x393/0x540 [ 462.315069] ? fput+0x2b/0x190 [ 462.318268] ksys_ioctl+0x9b/0xc0 [ 462.321708] __x64_sys_ioctl+0x6f/0xb0 [ 462.325583] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 462.330154] do_syscall_64+0xf9/0x620 [ 462.333946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.339125] RIP: 0033:0x7fc113d9d639 [ 462.342824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 462.361707] RSP: 002b:00007fc112310168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.369399] RAX: ffffffffffffffda RBX: 00007fc113ebdf80 RCX: 00007fc113d9d639 [ 462.376652] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000006 [ 462.383907] RBP: 00007fc1123101d0 R08: 0000000000000000 R09: 0000000000000000 [ 462.391161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.398420] R13: 00007ffeaa82c4ef R14: 00007fc112310300 R15: 0000000000022000 08:35:16 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:16 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:35:16 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x0, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 462.593514] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 462.593514] êCH]. 08:35:16 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x0, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) (fail_nth: 3) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 08:35:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5421, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 462.848018] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 462.848018] êCH]. [ 462.901739] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 462.901739] êCH]. [ 462.960903] FAULT_INJECTION: forcing a failure. [ 462.960903] name failslab, interval 1, probability 0, space 0, times 0 [ 462.972978] CPU: 1 PID: 5644 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 462.980866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 462.990222] Call Trace: [ 462.992818] dump_stack+0x1fc/0x2ef [ 462.996455] should_fail.cold+0xa/0xf [ 463.000262] ? setup_fault_attr+0x200/0x200 [ 463.004587] ? lock_acquire+0x170/0x3c0 [ 463.008575] __should_failslab+0x115/0x180 [ 463.012818] should_failslab+0x5/0x10 [ 463.016623] kmem_cache_alloc_trace+0x284/0x380 [ 463.021300] gsmld_open+0x151/0x7e0 [ 463.024927] ? gsmld_close+0x1f0/0x1f0 [ 463.028815] tty_ldisc_open+0x81/0xc0 [ 463.032617] tty_set_ldisc+0x2d2/0x650 [ 463.036514] tty_ioctl+0xb4b/0x1630 [ 463.040151] ? tty_fasync+0x300/0x300 [ 463.043950] ? get_pid_task+0xf4/0x190 [ 463.047838] ? mark_held_locks+0xf0/0xf0 [ 463.051905] ? perf_trace_lock_acquire+0xef/0x530 [ 463.056749] ? HARDIRQ_verbose+0x10/0x10 [ 463.060820] ? ksys_write+0x241/0x2a0 [ 463.064619] ? tty_fasync+0x300/0x300 [ 463.068419] do_vfs_ioctl+0xcdb/0x12e0 [ 463.072313] ? lock_downgrade+0x720/0x720 [ 463.076463] ? check_preemption_disabled+0x41/0x280 [ 463.081480] ? ioctl_preallocate+0x200/0x200 [ 463.085902] ? __fget+0x356/0x510 [ 463.089358] ? do_dup2+0x450/0x450 [ 463.092896] ? vfs_write+0x393/0x540 [ 463.096611] ? fput+0x2b/0x190 [ 463.099805] ksys_ioctl+0x9b/0xc0 [ 463.103257] __x64_sys_ioctl+0x6f/0xb0 [ 463.107143] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 463.111725] do_syscall_64+0xf9/0x620 [ 463.115544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.120733] RIP: 0033:0x7fc113d9d639 [ 463.124441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 463.143338] RSP: 002b:00007fc112310168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.151051] RAX: ffffffffffffffda RBX: 00007fc113ebdf80 RCX: 00007fc113d9d639 08:35:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5450, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 463.158336] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000006 [ 463.165609] RBP: 00007fc1123101d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.172880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.180157] R13: 00007ffeaa82c4ef R14: 00007fc112310300 R15: 0000000000022000 08:35:17 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) (fail_nth: 4) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 08:35:17 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x0, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5451, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:17 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 463.407848] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 463.496551] FAULT_INJECTION: forcing a failure. [ 463.496551] name failslab, interval 1, probability 0, space 0, times 0 [ 463.532593] CPU: 0 PID: 5676 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 463.540409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 463.549761] Call Trace: [ 463.552437] dump_stack+0x1fc/0x2ef [ 463.556176] should_fail.cold+0xa/0xf [ 463.559986] ? setup_fault_attr+0x200/0x200 [ 463.564316] ? gsm_activate_mux+0x1ea/0x290 [ 463.568637] __should_failslab+0x115/0x180 [ 463.572893] should_failslab+0x5/0x10 [ 463.576695] kmem_cache_alloc_trace+0x46/0x380 [ 463.581269] gsm_dlci_alloc+0x46/0x410 [ 463.585145] gsm_activate_mux+0x1f4/0x290 [ 463.589277] gsmld_open+0x4fa/0x7e0 [ 463.592890] ? gsmld_close+0x1f0/0x1f0 [ 463.596760] tty_ldisc_open+0x81/0xc0 [ 463.600545] tty_set_ldisc+0x2d2/0x650 [ 463.604419] tty_ioctl+0xb4b/0x1630 [ 463.608033] ? tty_fasync+0x300/0x300 [ 463.611821] ? get_pid_task+0xf4/0x190 [ 463.615696] ? mark_held_locks+0xf0/0xf0 [ 463.619746] ? perf_trace_lock_acquire+0xef/0x530 [ 463.624576] ? HARDIRQ_verbose+0x10/0x10 [ 463.628621] ? ksys_write+0x241/0x2a0 [ 463.632406] ? tty_fasync+0x300/0x300 [ 463.636193] do_vfs_ioctl+0xcdb/0x12e0 [ 463.640065] ? lock_downgrade+0x720/0x720 [ 463.644199] ? check_preemption_disabled+0x41/0x280 [ 463.649196] ? ioctl_preallocate+0x200/0x200 [ 463.653593] ? __fget+0x356/0x510 [ 463.657033] ? do_dup2+0x450/0x450 [ 463.660563] ? vfs_write+0x393/0x540 [ 463.664267] ? fput+0x2b/0x190 [ 463.667445] ksys_ioctl+0x9b/0xc0 [ 463.670885] __x64_sys_ioctl+0x6f/0xb0 [ 463.674756] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 463.679320] do_syscall_64+0xf9/0x620 [ 463.683109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.688281] RIP: 0033:0x7fc113d9d639 [ 463.691978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 463.710865] RSP: 002b:00007fc112310168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.718555] RAX: ffffffffffffffda RBX: 00007fc113ebdf80 RCX: 00007fc113d9d639 [ 463.725807] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000006 [ 463.733060] RBP: 00007fc1123101d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.740315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:35:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5452, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 463.747568] R13: 00007ffeaa82c4ef R14: 00007fc112310300 R15: 0000000000022000 08:35:17 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5460, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) (fail_nth: 5) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 08:35:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40049409, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:18 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x0, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:18 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:18 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:35:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x4020940d, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 464.435242] FAULT_INJECTION: forcing a failure. [ 464.435242] name failslab, interval 1, probability 0, space 0, times 0 [ 464.518041] snd_aloop snd_aloop.0: control 0:0:0:syz1:0 is already present [ 464.571574] CPU: 0 PID: 5732 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 464.579486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 464.588839] Call Trace: [ 464.591451] dump_stack+0x1fc/0x2ef [ 464.595110] should_fail.cold+0xa/0xf [ 464.598919] ? setup_fault_attr+0x200/0x200 [ 464.603250] ? gsm_activate_mux+0x1ea/0x290 [ 464.607579] __should_failslab+0x115/0x180 [ 464.611942] should_failslab+0x5/0x10 [ 464.615754] kmem_cache_alloc_trace+0x46/0x380 [ 464.620350] gsm_dlci_alloc+0x46/0x410 [ 464.624239] gsm_activate_mux+0x1f4/0x290 [ 464.628387] gsmld_open+0x4fa/0x7e0 [ 464.632014] ? gsmld_close+0x1f0/0x1f0 [ 464.635909] tty_ldisc_open+0x81/0xc0 [ 464.639710] tty_set_ldisc+0x2d2/0x650 [ 464.643621] tty_ioctl+0xb4b/0x1630 [ 464.647249] ? tty_fasync+0x300/0x300 [ 464.651060] ? get_pid_task+0xf4/0x190 [ 464.654971] ? mark_held_locks+0xf0/0xf0 [ 464.659036] ? perf_trace_lock_acquire+0xef/0x530 [ 464.663882] ? HARDIRQ_verbose+0x10/0x10 [ 464.667940] ? ksys_write+0x241/0x2a0 [ 464.671745] ? tty_fasync+0x300/0x300 [ 464.675555] do_vfs_ioctl+0xcdb/0x12e0 [ 464.679452] ? lock_downgrade+0x720/0x720 [ 464.683601] ? check_preemption_disabled+0x41/0x280 [ 464.688617] ? ioctl_preallocate+0x200/0x200 [ 464.693026] ? __fget+0x356/0x510 [ 464.696480] ? do_dup2+0x450/0x450 [ 464.700017] ? vfs_write+0x393/0x540 [ 464.703735] ? fput+0x2b/0x190 [ 464.706954] ksys_ioctl+0x9b/0xc0 [ 464.710409] __x64_sys_ioctl+0x6f/0xb0 [ 464.714298] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 464.718895] do_syscall_64+0xf9/0x620 [ 464.722695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.727880] RIP: 0033:0x7fc113d9d639 [ 464.731588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 464.750484] RSP: 002b:00007fc112310168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.758190] RAX: ffffffffffffffda RBX: 00007fc113ebdf80 RCX: 00007fc113d9d639 [ 464.765454] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000006 [ 464.772738] RBP: 00007fc1123101d0 R08: 0000000000000000 R09: 0000000000000000 [ 464.780005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.787270] R13: 00007ffeaa82c4ef R14: 00007fc112310300 R15: 0000000000022000 08:35:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) (fail_nth: 6) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 08:35:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40405514, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:19 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x0, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 465.158538] FAULT_INJECTION: forcing a failure. [ 465.158538] name failslab, interval 1, probability 0, space 0, times 0 [ 465.213935] CPU: 1 PID: 5779 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 465.221765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 465.231125] Call Trace: [ 465.233747] dump_stack+0x1fc/0x2ef [ 465.237382] should_fail.cold+0xa/0xf [ 465.241186] ? setup_fault_attr+0x200/0x200 [ 465.245510] ? lock_acquire+0x170/0x3c0 [ 465.249491] __should_failslab+0x115/0x180 [ 465.253731] should_failslab+0x5/0x10 [ 465.257530] __kmalloc+0x2ab/0x3c0 [ 465.261067] ? __kfifo_alloc+0x174/0x290 [ 465.265129] __kfifo_alloc+0x174/0x290 [ 465.269026] gsm_dlci_alloc+0xd4/0x410 [ 465.272920] gsm_activate_mux+0x1f4/0x290 [ 465.277072] gsmld_open+0x4fa/0x7e0 [ 465.280704] ? gsmld_close+0x1f0/0x1f0 [ 465.284605] tty_ldisc_open+0x81/0xc0 [ 465.288413] tty_set_ldisc+0x2d2/0x650 [ 465.292315] tty_ioctl+0xb4b/0x1630 [ 465.295959] ? tty_fasync+0x300/0x300 [ 465.299768] ? get_pid_task+0xf4/0x190 [ 465.303659] ? mark_held_locks+0xf0/0xf0 [ 465.307729] ? perf_trace_lock_acquire+0xef/0x530 [ 465.312581] ? HARDIRQ_verbose+0x10/0x10 [ 465.316645] ? ksys_write+0x241/0x2a0 [ 465.320454] ? tty_fasync+0x300/0x300 [ 465.324263] do_vfs_ioctl+0xcdb/0x12e0 [ 465.328162] ? lock_downgrade+0x720/0x720 [ 465.332332] ? check_preemption_disabled+0x41/0x280 [ 465.337356] ? ioctl_preallocate+0x200/0x200 [ 465.341772] ? __fget+0x356/0x510 [ 465.345230] ? do_dup2+0x450/0x450 [ 465.348771] ? vfs_write+0x393/0x540 [ 465.352489] ? fput+0x2b/0x190 [ 465.355689] ksys_ioctl+0x9b/0xc0 [ 465.359158] __x64_sys_ioctl+0x6f/0xb0 [ 465.363057] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 465.367642] do_syscall_64+0xf9/0x620 [ 465.371462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.376649] RIP: 0033:0x7fc113d9d639 [ 465.380360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 465.399255] RSP: 002b:00007fc112310168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.406967] RAX: ffffffffffffffda RBX: 00007fc113ebdf80 RCX: 00007fc113d9d639 08:35:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40405515, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 465.414244] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000006 [ 465.421517] RBP: 00007fc1123101d0 R08: 0000000000000000 R09: 0000000000000000 [ 465.428815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.436085] R13: 00007ffeaa82c4ef R14: 00007fc112310300 R15: 0000000000022000 08:35:19 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:19 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:19 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 08:35:19 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) (fail_nth: 7) socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 08:35:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x80045500, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x800455d1, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 465.600798] FAULT_INJECTION: forcing a failure. [ 465.600798] name failslab, interval 1, probability 0, space 0, times 0 [ 465.681984] CPU: 0 PID: 5811 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 465.689804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 465.699160] Call Trace: [ 465.701758] dump_stack+0x1fc/0x2ef [ 465.705416] should_fail.cold+0xa/0xf [ 465.709224] ? setup_fault_attr+0x200/0x200 [ 465.713544] ? lock_acquire+0x170/0x3c0 [ 465.717523] __should_failslab+0x115/0x180 [ 465.721765] should_failslab+0x5/0x10 [ 465.725569] __kmalloc_track_caller+0x2a6/0x3c0 [ 465.730239] ? kstrdup_const+0x53/0x80 [ 465.734150] kstrdup+0x36/0x70 [ 465.737347] kstrdup_const+0x53/0x80 [ 465.741064] kvasprintf_const+0x108/0x190 [ 465.745216] kobject_set_name_vargs+0x56/0x150 [ 465.749797] dev_set_name+0xbd/0xf0 [ 465.753424] ? device_initialize+0x450/0x450 [ 465.758363] ? tty_register_device_attr+0x21c/0x7a0 [ 465.763400] tty_register_device_attr+0x2f2/0x7a0 [ 465.768247] ? redirected_tty_write+0xb0/0xb0 [ 465.772748] ? __lockdep_init_map+0x100/0x5a0 [ 465.777249] ? __raw_spin_lock_init+0x28/0x100 [ 465.781832] ? tty_port_init+0x14d/0x1b0 [ 465.785898] ? gsm_dlci_alloc+0x353/0x410 [ 465.790057] gsmld_open+0x55f/0x7e0 [ 465.793695] ? gsmld_close+0x1f0/0x1f0 [ 465.797584] tty_ldisc_open+0x81/0xc0 [ 465.801386] tty_set_ldisc+0x2d2/0x650 [ 465.805280] tty_ioctl+0xb4b/0x1630 [ 465.808913] ? tty_fasync+0x300/0x300 [ 465.812715] ? get_pid_task+0xf4/0x190 [ 465.816606] ? mark_held_locks+0xf0/0xf0 [ 465.820671] ? perf_trace_lock_acquire+0xef/0x530 [ 465.825520] ? HARDIRQ_verbose+0x10/0x10 [ 465.829583] ? ksys_write+0x241/0x2a0 [ 465.833387] ? tty_fasync+0x300/0x300 [ 465.837197] do_vfs_ioctl+0xcdb/0x12e0 [ 465.841085] ? lock_downgrade+0x720/0x720 [ 465.845237] ? check_preemption_disabled+0x41/0x280 [ 465.850256] ? ioctl_preallocate+0x200/0x200 [ 465.854682] ? __fget+0x356/0x510 [ 465.858138] ? do_dup2+0x450/0x450 [ 465.861677] ? vfs_write+0x393/0x540 [ 465.865390] ? fput+0x2b/0x190 [ 465.868592] ksys_ioctl+0x9b/0xc0 [ 465.872049] __x64_sys_ioctl+0x6f/0xb0 [ 465.875937] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 465.880521] do_syscall_64+0xf9/0x620 [ 465.884338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.889521] RIP: 0033:0x7fc113d9d639 [ 465.893232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 465.912135] RSP: 002b:00007fc112310168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.919852] RAX: ffffffffffffffda RBX: 00007fc113ebdf80 RCX: 00007fc113d9d639 08:35:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x81785501, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 465.927119] RDX: 0000000020000040 RSI: 0000000000005423 RDI: 0000000000000006 [ 465.934386] RBP: 00007fc1123101d0 R08: 0000000000000000 R09: 0000000000000000 [ 465.941653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.948921] R13: 00007ffeaa82c4ef R14: 00007fc112310300 R15: 0000000000022000 [ 465.963511] XFS (loop0): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 465.963511] êCH]. [ 466.013053] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 466.013053] êCH]. 08:35:20 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0045516, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:20 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x0, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r3) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 466.383688] kasan: CONFIG_KASAN_INLINE enabled [ 466.388489] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 466.434247] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 466.440503] CPU: 0 PID: 5804 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 466.448288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 466.457652] RIP: 0010:cdev_del+0x22/0x90 [ 466.461725] Code: cf 0f 1f 80 00 00 00 00 55 48 89 fd 48 83 ec 08 e8 b3 dc be ff 48 8d 7d 64 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 4f 48 [ 466.480633] RSP: 0018:ffff88809421fc50 EFLAGS: 00010207 [ 466.485988] RAX: dffffc0000000000 RBX: ffff888238872d00 RCX: ffffffff83b8674f [ 466.493237] RDX: 000000000000000c RSI: ffffffff81a3a8bd RDI: 0000000000000064 [ 466.500487] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 466.507829] R10: 0000000000000007 R11: 0000000000000000 R12: ffff888238872d08 [ 466.515089] R13: ffff88823890e3c8 R14: ffff88805129b568 R15: ffff888238872c00 [ 466.522351] FS: 00005555557d7400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 466.530573] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 466.536451] CR2: 0000555556f8e708 CR3: 000000009f017000 CR4: 00000000003406f0 [ 466.543725] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 466.551007] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 466.558303] Call Trace: [ 466.560896] tty_unregister_device+0x112/0x1b0 [ 466.565499] gsmld_close+0xaa/0x1f0 [ 466.569131] ? gsm_cleanup_mux+0x3e0/0x3e0 [ 466.573364] tty_ldisc_close+0xa2/0xd0 [ 466.577255] tty_ldisc_hangup+0x2a1/0x700 [ 466.581415] __tty_hangup.part.0+0x359/0x780 [ 466.585829] tty_vhangup+0x1d/0x30 [ 466.589365] pty_close+0x3a1/0x4f0 [ 466.592898] ? pty_cleanup+0x40/0x40 [ 466.596604] tty_release+0x45e/0x1210 [ 466.600414] ? do_tty_hangup+0x30/0x30 [ 466.604296] __fput+0x2ce/0x890 [ 466.607574] task_work_run+0x148/0x1c0 [ 466.611460] exit_to_usermode_loop+0x251/0x2a0 [ 466.616036] do_syscall_64+0x538/0x620 [ 466.619927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.625309] RIP: 0033:0x7fc113d4f40b [ 466.629022] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 466.647916] RSP: 002b:00007ffeaa82c550 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 466.655615] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fc113d4f40b [ 466.662980] RDX: 0000000000000000 RSI: 0000001b3242449c RDI: 0000000000000005 [ 466.670268] RBP: 00007fc113ebf980 R08: 0000000000000000 R09: 00000000c2ee2f26 [ 466.677535] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000071df6 08:35:20 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x0, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 08:35:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc00455d0, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 08:35:20 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x8000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB="c825b45d579849b351cb582a5f1add2e143ac7ba73737b0aea43481c"], 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400007, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3}, &(0x7f00000005c0)={0x8001, 0x4, 0xb6, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x40, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) keyctl$search(0xa, r2, &(0x7f0000000540)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, r4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x4}, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) [ 466.684793] R13: 00007ffeaa82c650 R14: 00007fc113ebe120 R15: 0000000000000032 [ 466.692057] Modules linked in: [ 466.705451] ---[ end trace 0cbf096364f7aaa3 ]--- [ 466.711755] RIP: 0010:cdev_del+0x22/0x90 [ 466.717097] Code: cf 0f 1f 80 00 00 00 00 55 48 89 fd 48 83 ec 08 e8 b3 dc be ff 48 8d 7d 64 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 4f 48 [ 466.763685] RSP: 0018:ffff88809421fc50 EFLAGS: 00010207 [ 466.769077] RAX: dffffc0000000000 RBX: ffff888238872d00 RCX: ffffffff83b8674f [ 466.777213] RDX: 000000000000000c RSI: ffffffff81a3a8bd RDI: 0000000000000064 [ 466.788185] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 466.796528] R10: 0000000000000007 R11: 0000000000000000 R12: ffff888238872d08 [ 466.809010] R13: ffff88823890e3c8 R14: ffff88805129b568 R15: ffff888238872c00 [ 466.816811] FS: 00005555557d7400(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 466.828994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 466.844205] CR2: 00007f52d821a000 CR3: 000000009f017000 CR4: 00000000003426e0 [ 466.853963] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 466.866721] XFS (loop3): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 466.866721] êCH]. [ 466.878794] XFS (loop2): unknown mount option [È%´]W˜I³QËX*_Ý.:Ǻss{ [ 466.878794] êCH]. [ 466.891964] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 466.925906] Kernel panic - not syncing: Fatal exception [ 466.931570] Kernel Offset: disabled [ 466.935187] Rebooting in 86400 seconds..