, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 10:59:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x0, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:29 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x7100000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:29 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x3ff, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000000)=ANY=[@ANYBLOB="7597f183b94702716e6f656e66"]) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xfffffffffffffffc, 0x10000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x8, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r1, 0x3ff}, 0x8) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) r3 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x2}, [{0x2, 0x7, r2}], {0x4, 0x2}, [{0x8, 0x4, r3}], {0x10, 0x5}, {0x20, 0x1}}, 0x34, 0x3) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000280)=0x60) 10:59:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x0, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:29 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x7300000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="b30e99207ca07722898e4400696a68281146e08c0b8fd6812bfc50d80341e4d654debf88d265f4ca7530c379857759ba49a027660e7171f0b88d5401ab58f7b295c7c1f0322db106ba89c7cf31ef9ea151d20e59a938c6c9b9727d9f934f071bbdd35915326be3de85f92ae4f9b494055909461c6f98d379a44572caac94955a20af24e18ff81c15ee57914669850de3fea2d4a1c760f7a0b2214e5fc0191dad"]) write$nbd(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="67446698020000000100000004000000cb5e501b7a420ac0e9efa0e64d2b9cb4d450e9b005c4070ac0fe336d09e60a9202ca0e91ba43b48e2934551bef8bd3b10ac97e29cfd880bae47e7b0601f48730926e359b05bc53c2bca2d8543bbe81799abdb7da6c3cf80fe7a93004a104d07869826666f08f6835e24c1cb153ff9c784f518c7c768cfa1a873f66a0185295e5a795110d6adb2d09c6a00bfe811c6713a92f000000000000ae11a7e2c7ee60d07786fabef74042eec0720b3de01fa8"], 0xbf) 10:59:29 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:29 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x85ffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1121.837105][T26023] XFS (loop4): unknown mount option [ |w"D]. 10:59:35 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 10:59:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x0, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) removexattr(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)=@known='security.apparmor\x00') setxattr$security_evm(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@sha1={0x1, "fc9087759be21c35faf25dba5c2134598ceea2fd"}, 0x15, 0x3) 10:59:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x9cffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:35 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x9fffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x0, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1127.963327][T26250] XFS (loop4): Invalid superblock magic number 10:59:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xff00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:35 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@barrier='barrier'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_dev$amidi(&(0x7f0000004680)='/dev/amidi#\x00', 0xfffffffffffffffb, 0x80) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000046c0)=0x4, 0x4) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x613, &(0x7f0000000200)=0x2) write$P9_RREADDIR(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="d8000000290200ff7f0000010300000001000000000000001f000000000000000005002e2f6275738802000000010000000000000006000000000000000005002e2f62757340020000000200000000000000ffff0000000000000705002e2f6275731003000000010000000000000007000000000000004a05002e2f6275730f03000000000000000000000009ac2cc9c60e90b126a35dd773f6000000000000000905002e2f6275732203000000050000000000000005000000000000000105002e2f6275730a02000000050000000000000008000000000000000807002e2f66696c6530"], 0xd8) [ 1128.294061][T26484] XFS (loop4): unknown mount option [barrier]. 10:59:44 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 10:59:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x0, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xff9f000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:44 executing program 4: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)) 10:59:44 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000240)='logon\x00', 0x0, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xffffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1136.410911][T26704] XFS (loop4): Invalid superblock magic number 10:59:44 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000240)='logon\x00', 0x0, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:52 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 10:59:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="75716e6ffa6da7c86ed93dc267110b7d571c78f241680114decbe130f6689b6517409ebbf77159dc24a05a42ab0f13a706940661f1c9908bbabb282abc3df9ee584c2a5af153fe3f163b34a78b5c4c95d70870276d95a8e40ac5194ea114d49d1d12c9b6851d9ff540aa913bf7d4a7a0d1a48e5bb67b4f090000007389c04081"]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$setopts(0x4200, r0, 0x4800000000000000, 0x0) 10:59:52 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000240)='logon\x00', 0x0, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:52 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1144.596079][T26965] XFS (loop4): unknown mount option [uqnomn=g }WxAh0he@qY$ZBaɐ(*=XL*ZS?;4\Lp'm [ 1144.596079][T26965] Nԝɶ@;ԧѤ[{O ]. 10:59:52 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="75716e6f656e666f7263652c0040c4dfb582a9b529adb12a3f81c83cab93e08ee1d4"]) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x680140) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x8, 0x3bc, 0x9, 0x6, 0x3dd, 0x8000, 0xfff, {0x0, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x80000000}}, 0xe7, 0x1f, 0xffffffffffff8000, 0x0, 0x3}}, &(0x7f0000000340)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000380)=r1, 0x4) 10:59:52 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:52 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x5}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:58 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 10:59:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:59:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x87, "e345399332a83b5e0eef595c93539ac62b0b0fe7d5fcd444f96aef49c8fb307835aa67ff1933c7e228b3f54c5d18281d5a7fde36f9186c3c6999097a8cffe1900739709748c98edeb6874b9edcb92cb2db05daa869fbe38e8840d3926e5cade3b44308dc4474aacaf04d8bc96b18e7623ecf5e59e2b59a3bfd2ad6bcc338943d1e6393e29128ab"}, &(0x7f00000001c0)=0x8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0xc, 0x10001, 0x8000, 0xfffffffffffffe01, 0x38b4, 0x200, 0xb630, 0x4, r1}, 0x20) 10:59:58 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x6}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:58 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:59 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1151.208970][T27422] XFS (loop4): Invalid superblock magic number 10:59:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:59:59 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 10:59:59 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x8}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 10:59:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:06 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:00:06 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000005c0)=0x3, 0x4) 11:00:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xa}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:06 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, 0x0, &(0x7f00000005c0)=""/214, 0xd6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 11:00:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x2080, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x1, 0x1, [0x8, 0x100, 0x6, 0xffff, 0x948b, 0x600000000, 0x8]}) 11:00:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:06 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 11:00:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xe}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1158.524530][T27782] XFS (loop4): Invalid superblock magic number 11:00:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) connect$llc(0xffffffffffffffff, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:00:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xf}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:15 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:15 executing program 3: creat(0x0, 0x0) geteuid() pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)='vmnet0.:\x00', 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() syz_open_procfs$namespace(0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 11:00:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) getpgrp(0xffffffffffffffff) r0 = getpid() r1 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x6}) 11:00:15 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x10}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffeaf, 0x0, 0x0, 0xffffffae) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="9d"], 0x0, 0x1}, 0x20) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x200000000102000}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB='F'], 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1167.857280][T27923] XFS (loop4): Invalid superblock magic number 11:00:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x14}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x80000000, 0x20, 0x8001, 0x80000000}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r1, 0x4e3d7067, 0x3, 0xffffffff}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={r2, 0xaf, "696cd638d566a5468b09169915950dfd199776382cb97d5a7569fb6e5cd0e5d0cceda5192da25de25845c5434c5717d07095b9d7aee22c5243ab5d72973c036b1f6ce74f0a5fc25a2bcdbb901170e58bf12faac3bc86a80c7d3adf714fcaa485e01feea3c732ed171908aea756a377b74560b7bf5b5fbc212c9702683b750b7e50089c2915e11e10b392ebe8dd7b2b55a887efdda96345ddf2e14ef44f801cc043cb8421bfb6a675a623dbe833fd9c"}, &(0x7f0000000200)=0xb7) [ 1168.216811][T28142] XFS (loop4): Invalid superblock magic number 11:00:23 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) connect$llc(0xffffffffffffffff, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:00:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:23 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x18}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffeaf, 0x0, 0x0, 0xffffffae) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x0}, 0x20) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x200000000102000}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB='F'], 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_open_dev$ndb(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:00:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="f5736e6fc137"]) r0 = dup(0xffffffffffffffff) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x4, 0x20, 0x4, 0x1a, 0x83, 0xcf, 0x221, 0x2, 0x1}) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'nr0\x00'}) [ 1176.172210][T28284] XFS (loop4): unknown mount option [sno7]. 11:00:24 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1b}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:24 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10040, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000340)={0x76, 0x7d, 0x2, {{0x0, 0x56, 0x1f, 0x9129, {0x0, 0x2, 0x2}, 0x100000, 0xfffffffffffffffe, 0xffffffffffffffff, 0xdd, 0x10, '/vmnet1.security', 0xb, 'uqnoenforce', 0x4, 'xfs\x00', 0x4, 'xfs\x00'}, 0xb, 'uqnoenforce', r1, r2, r3}}, 0x76) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="652cf0986c3ac159cb3f6783cb0000009600010000000000b90b6717411d9534ca93f00113a1"]) 11:00:24 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1c}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 1176.504195][T28504] XFS (loop4): unknown mount option [e]. 11:00:30 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) connect$llc(0xffffffffffffffff, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:00:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffeaf, 0x0, 0x0, 0xffffffae) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x200000000102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:00:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:30 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x23}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./bus\x00', 0x100000001, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:00:30 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2b}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1182.596747][T28634] XFS (loop4): Invalid superblock magic number 11:00:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:30 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2c}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:30 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40184150, 0x0) 11:00:37 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:00:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 11:00:37 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2f}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:37 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/40, 0x28}], 0x1) 11:00:37 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x30}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getpgrp(0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) [ 1189.962115][T28781] XFS (loop4): Invalid superblock magic number 11:00:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:37 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:37 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x3000)=nil) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000003c0)={0x4, 0x8, 0xfa00, {r1, 0xd5c8}}, 0x10) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000200)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="696e6f647036342c696e6f646536342c617474bad91244610800000000000000390ed866077a6e1644219048ed52ee60ece67ef9fa5ab33d7e8fec72e86ffc532699c1ae73b0322b91857938de3773b1fd484fc03e761115c4b142b4040ad6f8b18fe4d9b982802e654825f84f88d902db8352191877d98026d31439f942c0ee7d110449f9389272fb4c96080090e4119e792bfea253b9c8f6435c2c6798593d2a96098bcc"]) [ 1190.186568][T28914] mmap: syz-executor.3 (28914) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 1190.213075][T28916] XFS (loop4): unknown mount option [inodp64]. 11:00:47 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:00:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:47 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x38}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 11:00:47 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0884113, 0x0) 11:00:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880314fb0a000200060ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 11:00:47 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3c}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 1199.272579][T29141] XFS (loop4): Invalid superblock magic number [ 1199.368763][T29163] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 11:00:47 executing program 4: 11:00:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000002c0)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1083}) [ 1199.585931][T29180] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 11:00:54 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:00:54 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x47}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="8175716e6f65652c0000000000"]) 11:00:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880305fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) [ 1206.495088][T29298] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1206.512564][T29299] XFS (loop4): unknown mount option [uqnoee]. 11:00:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:54 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x48}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:00:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:00:54 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000300)=@pppol2tpv3, 0x80, &(0x7f0000001380)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/244, 0xf4}, 0x100) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_type(r3, &(0x7f0000001500)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r2) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2) [ 1206.623972][T29299] XFS (loop4): unknown mount option [uqnoee]. 11:00:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:00:54 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4b}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:01 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:01 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:01:01 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x500, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x3, 0x8, {0x51, 0x6, 0x8001, {0x5, 0x20}, {0x40, 0x8}, @period={0x5b, 0xffffffffffffffe5, 0x0, 0x3f, 0xa, {0xdb, 0x6, 0x200, 0x401}, 0x4, &(0x7f00000000c0)=[0x3ff, 0x7, 0x6, 0x8]}}, {0x0, 0x8b, 0xf5, {0x7ff, 0x1}, {0x101, 0x6000000}, @rumble={0x81, 0x91}}}) getpeername$llc(r0, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x10) getsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='cov\x00\x00\x00']) 11:01:01 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, 0x0, 0x84) 11:01:01 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x60}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:01 executing program 3: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[], 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r0, 0x28, &(0x7f0000000400)}, 0xfffffffffffffec4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000040)="b74c4cbf961e0c8e7d02e13f19f0", 0x0, 0x54e6}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 11:01:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:01:01 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:01 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1213.958205][T29446] XFS (loop4): unknown mount option [cov]. 11:01:02 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x63}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:01:11 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:11 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@initdev, @in6=@local}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000001c0)='./bus\x00', 0x5, 0xfffffffffffffd11, 0x0, 0xfffffffffffffffd, &(0x7f0000000200)=ANY=[@ANYBLOB="7365636c6162656c2c6f626a5f726f6c653c7365636c6162656c234c521f2229a2a1032adf2c7375626a5f2cfbc1c53d75716e6f656e666f7263652c6673757569637665367d2d00637f7b2d327575322d77387d372d37363177777300362c61707072616973652c00"]) 11:01:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:11 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x71}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, 0x0, 0x0, 0x0) 11:01:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0xfffffffffffffdc3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) close(r2) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x1) recvmsg(r1, &(0x7f000000b800)={0x0, 0x0, &(0x7f000000b7c0)=[{0x0}, {&(0x7f000000b580)=""/229, 0xe5}, {&(0x7f000000b680)=""/244, 0xf4}, {&(0x7f000000b780)=""/21, 0x15}], 0x4}, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) 11:01:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@uqnoenforce='uqnoenforce'}], [{@appraise_type='appraise_type=imasig'}, {@subj_type={'subj_type', 0x3d, 'bdev'}}]}) 11:01:11 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x73}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, 0x0, 0x0, 0x0) 11:01:11 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000300)=@pppol2tpv3, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/244, 0xf4}, 0x100) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) close(r3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_type(r3, &(0x7f0000001500)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r2) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2) 11:01:11 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x300}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1223.571267][T29766] XFS (loop4): unknown mount option [appraise_type=imasig]. [ 1223.664068][T29766] XFS (loop4): unknown mount option [appraise_type=imasig]. 11:01:18 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, 0x0, 0x0, 0x0) 11:01:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./bus\x00', 0x8, 0xffe0, 0x0, 0xb88021, &(0x7f0000000000)) 11:01:18 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:18 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x500}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:18 executing program 3: bind(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x7fffffff, 0x2, &(0x7f0000001480)=[{0x0}, {0x0}], 0xc002, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000040), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000), 0x10) 11:01:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@uqnoenforce='uqnoenforce'}], [{@dont_hash='dont_hash'}]}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x206800, 0x0) 11:01:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) 11:01:18 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:18 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x600}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:18 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc002, 0x0) [ 1230.739040][T30002] XFS (loop4): unknown mount option [dont_hash]. 11:01:18 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:27 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r0, 0x0, 0x0, 0x2000002) connect$llc(r0, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:27 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x700}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) 11:01:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:01:27 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc002, 0x0) 11:01:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) 11:01:27 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xa00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:27 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc002, 0x0) [ 1240.120286][T30191] XFS (loop4): Invalid superblock magic number 11:01:28 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xc00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) 11:01:34 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r0, 0x0, 0x0, 0x2000002) connect$llc(r0, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x802, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)) 11:01:34 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xe00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:34 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc002, 0x0) 11:01:34 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xf00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1246.267188][T30243] XFS (loop4): Invalid superblock magic number 11:01:34 executing program 3: syz_mount_image$minix(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc002, 0x0) 11:01:34 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1400}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:41 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="65d2186e"]) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 11:01:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:41 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r0, 0x0, 0x0, 0x2000002) connect$llc(r0, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:41 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1800}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:41 executing program 3: syz_mount_image$minix(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc002, 0x0) [ 1253.504006][T30404] XFS (loop4): unknown mount option [en]. 11:01:41 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1b00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:41 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x0, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:41 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) connect$netrom(r0, &(0x7f0000000100)={{0x3, @default, 0x6}, [@bcast, @bcast, @bcast, @null, @default, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x402000, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x1d1e) r2 = openat(r0, &(0x7f0000000200)='./bus/../file0\x00', 0x20000, 0x100) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f00000001c0)={0xfff, 0x6, 0x100000001, 0xfb8, 0xa0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="75530fb1c56dde229d22652c00"]) 11:01:41 executing program 3: syz_mount_image$minix(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc002, 0x0) 11:01:41 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1c00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:41 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:48 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x0, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:48 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x50000) r1 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) mount$fuse(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='fuse\x00', 0x2800800, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}], [{@uid_gt={'uid>', r3}}, {@context={'context', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, 'user-mime_typemd5sum:vmnet1*trustedwlan1{em1proceth1-!mime_type'}}, {@audit='audit'}, {@subj_user={'subj_user', 0x3d, 'quota'}}]}}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@quota='quota'}]}) 11:01:48 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', 0x0, 0x0, 0x0, 0x0, 0xc002, 0x0) 11:01:48 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:48 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x0, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:48 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', 0x0, 0x0, 0x0, 0x0, 0xc002, 0x0) 11:01:48 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2300}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1261.059790][T30652] XFS (loop4): Invalid superblock magic number 11:01:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:49 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x108}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r1, 0x110, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8050) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local}, &(0x7f00000000c0)=0xc) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x7, 0x80, 0x6, {0x0, 0x2710}, {r3, r4/1000+30000}, {0x3, 0x43ccf3cb, 0x6}, 0x1, @canfd={{0x1, 0x3553, 0x5, 0x2}, 0xe, 0x2, 0x0, 0x0, "789a1d89cb41a126c559d8c95139e0f907d03512996bc7222e38b4f9be75124abf4d820ccea388470565a0c62d0d27fba58b676ee09906ad6bcdcb0233c3b7b9"}}, 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x4094) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000280)=0x7, 0x8) [ 1261.443893][T30793] XFS (loop4): Invalid superblock magic number 11:01:57 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:01:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x0, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2b00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:01:57 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', 0x0, 0x0, 0x0, 0x0, 0xc002, 0x0) 11:01:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) r1 = socket$inet(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x407, r1) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000000c0)=0xfc7b) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000180)) 11:01:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x0, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:01:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2c00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1269.536379][T30916] XFS (loop4): Invalid superblock magic number 11:01:57 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:01:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:01:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2f00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1269.809078][T31046] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. 11:02:04 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:04 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @initdev}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x20000, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000300)='./bus\x00', 0x1, 0x0, 0x0, 0x2000000, &(0x7f0000000400)=ANY=[@ANYBLOB='uqnoenforae,uid<', @ANYRESDEC=r0, @ANYBLOB=',permit_directio,appraise,obj_type=xfs\x00,fscontext=system_u,euid>', @ANYRESDEC=r0, @ANYBLOB=',uid>', @ANYRESDEC=r0, @ANYBLOB=',\x00']) 11:02:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x0, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:04 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x8040ae9f, &(0x7f00000000c0)) [ 1276.647071][T31070] Unknown ioctl 1074021761 11:02:04 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3400}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1276.715132][T31070] XFS (loop4): unknown mount option [uqnoenforae]. 11:02:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x0, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) vmsplice(r0, &(0x7f0000001540)=[{&(0x7f0000000140)="15e4a127bdf2a0157432bd32f0b2be7a58dedc7e8cf11492b5ec09bae44416b2234a6c9959f816d14389fd6766caaf0a79cc8230058026238b8598a21bb866ed48983871df6b7b62cef00d99fb41832e5826d6e80583af805d9a9960ab5afd4ddaf43548092c6ada897b1c56ce606a231f3fc299ed530bf3c5715e4a3e6c9b50c2b1590c0b41123c0ad72d2f9d613ace0189545da69fd6e3aad1fdfae5bdace62b27d60446d8a473918a3d2b789ace87779598bf9c2c91f4239c15b7dc4800fa12d04e4f1010c9af64d4748ec997f3c6c03a00d316e035e431f73581", 0xdc}, {&(0x7f0000000240)="6a07693c87cd07ff48de604099c8bab6c1ca51e0dbbf8241ca918e586b7e7c6ff4c53af22d5e236eba48b64d888d6212c5ff534f2a43dc489d423490597b1e525ae3e76b6dae47774d4fa847b3f3bb7a560c8b446f6542c87a21", 0x5a}, {&(0x7f00000002c0)="aadd617cdf9860835db79ca7d352a1162ba2ca8e1d4dd89cdc6a47c11e0a2594f54005d38d43eed906ffdf66a932ebea1e9391be8e3e54d6d4cfb6a0304ab37b446d8d082eb526b8f3d03d6a", 0x4c}, {&(0x7f0000000340)="4d5ff2d43a81635bb2ed0248e01b6b1e75f356a616e59c0bcb3e83752977a6dc92ca266fa576e7c9948e885a7323198e9b62d8025343765a74de5cf2bac7aef58f6e5d65be7212dbcee0291318b0020e62bd37c36bbcb388929c3b19b80af387855b8b1a80fd7beb02f1cb466f0b777fa4687d99283fcb8fc7dafc5873de3e0b7c0aeab8968196dd47dae1c8211d3a64c1cebe18eef4f03c8c7c9e8503b62f6b9398c43f23b963954364991dbe6dd038f2091ef3", 0xb4}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="83c4d77fb1e8b20b9b07bb1dee082b7daa60afa403231e1b1b829763eaea26bd43bc976b14af2e651a2a09552b30b84c3a627c09f7268e0879f8089901544b6ff88157b5fa22273a594393e1d7a5767058ff13e7c49ae6dfb8738131e647552d3bb4e0548f63", 0x66}, {&(0x7f0000001480)="0e3fea5fea00f0f959546b0b167e019786e41d0b6b16d0ec907b51c656b47584f73ab0df423d4fdb3740c32fdac3996f7a2c9604d678278ef30daed6fdd52914c780444ac15a8c9c48241dbbaf9c5358913f213121", 0x55}, {&(0x7f0000001500)="f7d01d681e40f8c705b7f3bb6f8594019e31f4476a0bb272ffdeebdaa79d3b6ff10edf5379", 0x25}], 0x8, 0x2) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0xfffffffffffffe48, 0x0, 0xfffffffffffffffd, &(0x7f0000000000)={[{@uqnoenforce='uqnoenforce'}]}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x6, 0x40) write$FUSE_INTERRUPT(r1, &(0x7f0000000100)={0x10, 0x0, 0x5}, 0x10) 11:02:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x0, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x8004ae98, &(0x7f00000000c0)) 11:02:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:11 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3800}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0x60, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0x301840) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x6, 0x9, 0x6}}, 0x30) ioctl$RTC_UIE_ON(r1, 0x7003) 11:02:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x0, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x8004ae98, &(0x7f00000000c0)) 11:02:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x0, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:11 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3c00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1284.090170][T31411] XFS (loop4): Invalid superblock magic number 11:02:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x5, 0x407, 0x2000009}, 0x3c) 11:02:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="75716e6f656d666f62cc2aef32"]) 11:02:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x0, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) [ 1284.327042][T31543] XFS (loop4): unknown mount option [uqnoemfob*2]. [ 1284.405719][T31543] XFS (loop4): unknown mount option [uqnoemfob*2]. 11:02:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:19 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0xd, &(0x7f0000000180)='trustedproc%\x00', 0xffffffffffffffff}, 0x30) r1 = socket$kcm(0x2b, 0x44000000000001, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x10}, {0x18, 0x0, 0x0, "6cbdd45a4a"}], 0x28}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg(r2, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 11:02:19 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:19 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3f00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x0, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0xffffffffffffffa3, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='uqnoenfkpce,\x00']) sysfs$1(0x1, &(0x7f00000000c0)='xfs\x00') r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@can, &(0x7f00000001c0)=0x80, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@generic={0x1, 0x3d, 0x1ff}) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x7fff, 0x80400) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x4}) 11:02:19 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:19 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={0x0, 0xddb}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x6}, 0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:02:19 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:02:19 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4700}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1291.389819][T31675] XFS (loop4): Invalid superblock magic number 11:02:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:28 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4800}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@uqnoenforce='uqnoenforce'}]}) 11:02:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:02:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:02:28 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4b00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) 11:02:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) [ 1300.783814][T31914] XFS (loop4): Invalid superblock magic number 11:02:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:02:35 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x6000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x80000) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0xfffffffffffffffe) 11:02:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) 11:02:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:02:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x6100}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x9, 0x100, 0x0, 0x5, 0x0, 0xfffffffffffffffd, 0x544, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x0, 0xa92}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) recvmsg$kcm(r0, &(0x7f0000006680)={0x0, 0x0, &(0x7f0000006580)=[{&(0x7f00000064c0)=""/143, 0x8f}], 0x1, &(0x7f00000065c0)=""/180, 0xb4}, 0x12000) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x936}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x8, 0x1, 0x3, 0x4, r2, 0x5, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe46) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='{nodev+em0ppp0trustedbdeveth0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x6, 0x289, 0x4, 0x14, 0x1, 0x2, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xffffffffffffff7b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0x9c) 11:02:36 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 1308.136790][T32169] XFS (loop4): Invalid superblock magic number 11:02:36 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x6300}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 11:02:42 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f0000002340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}, "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", [[], [], [], []]}, 0xff0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000100)={0x0, 0x2, 0x3019, 0x1}) 11:02:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x7100}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 11:02:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x9, 0x100, 0x0, 0x5, 0x0, 0xfffffffffffffffd, 0x544, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x0, 0xa92}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) recvmsg$kcm(r0, &(0x7f0000006680)={0x0, 0x0, &(0x7f0000006580)=[{&(0x7f00000064c0)=""/143, 0x8f}], 0x1, &(0x7f00000065c0)=""/180, 0xb4}, 0x12000) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x936}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x8, 0x1, 0x3, 0x4, r2, 0x5, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe46) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='{nodev+em0ppp0trustedbdeveth0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x6, 0x289, 0x4, 0x14, 0x1, 0x2, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xffffffffffffff7b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0x9c) 11:02:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x7300}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 1314.645595][T32417] XFS (loop4): Invalid superblock magic number 11:02:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:02:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x9fff}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) [ 1315.076597][T32652] XFS (loop4): Invalid superblock magic number 11:02:51 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:51 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xff00}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x9, 0x100, 0x0, 0x5, 0x0, 0xfffffffffffffffd, 0x544, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x0, 0xa92}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) recvmsg$kcm(r0, &(0x7f0000006680)={0x0, 0x0, &(0x7f0000006580)=[{&(0x7f00000064c0)=""/143, 0x8f}], 0x1, &(0x7f00000065c0)=""/180, 0xb4}, 0x12000) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x936}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x8, 0x1, 0x3, 0x4, r2, 0x5, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe46) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='{nodev+em0ppp0trustedbdeveth0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x6, 0x289, 0x4, 0x14, 0x1, 0x2, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xffffffffffffff7b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0x9c) 11:02:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0}, 0x2c) 11:02:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000000c0)={0xffffffffffff8000, 0x81, 0x4, 'queue1\x00', 0x40}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:02:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:51 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xff9f}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1324.035107][ T307] XFS (loop4): Invalid superblock magic number 11:02:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0}, 0x2c) 11:02:51 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x200000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 11:02:52 executing program 4: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff93ac62ccec254418cae93376d60c47aac94b3398f246cc6e7ed3b7b06bf4a9e4d9e02deb45f0cfdbb3711fc20d8f308d7b0a4129149eb3ff03a88000fbf53000"/83]) [ 1324.415334][ T544] XFS (loop4): unknown mount option [b%D3v GK3Fn~ӷk-E۳q 0{ [ 1324.415334][ T544] A)]. 11:02:58 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:02:58 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x600000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0}, 0x2c) 11:02:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000100)}, 0x20) 11:02:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x9, 0x100, 0x0, 0x5, 0x0, 0xfffffffffffffffd, 0x544, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x0, 0xa92}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) recvmsg$kcm(r0, &(0x7f0000006680)={0x0, 0x0, &(0x7f0000006580)=[{&(0x7f00000064c0)=""/143, 0x8f}], 0x1, &(0x7f00000065c0)=""/180, 0xb4}, 0x12000) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x936}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x8, 0x1, 0x3, 0x4, r2, 0x5, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe46) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='{nodev+em0ppp0trustedbdeveth0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x6, 0x289, 0x4, 0x14, 0x1, 0x2, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xffffffffffffff7b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0x9c) 11:02:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f0000000840)=0xc) r2 = syz_open_dev$mouse(&(0x7f0000000880)='/dev/input/mouse#\x00', 0xc294, 0x480000) perf_event_open(&(0x7f0000000900)={0xffffffffffffffff, 0x70, 0x80000001, 0xfffffffffffffe01, 0x5, 0xcb, 0x0, 0x6, 0x4, 0x1, 0xffffffffffffffff, 0x348e596c, 0x3, 0x7fff, 0x3f, 0x5, 0xfff, 0x7f, 0x1, 0x0, 0x6, 0x7, 0xffffffffe4ce5f78, 0x8, 0x6, 0x36e, 0x1, 0x3, 0x3ba, 0x8001, 0xff, 0x1, 0x6bb, 0xffff, 0x0, 0x0, 0x3, 0xfff, 0x0, 0x6, 0x4, @perf_config_ext={0x5, 0x8001}, 0x10, 0x4eaf, 0x101, 0x7, 0x7fffffff, 0x7ff, 0x3}, r1, 0xffffffffffffffff, r2, 0x8) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000009c0)=0x6, &(0x7f0000000a00)=0x4) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0x0, 0x0, 0x4, 0x6, 0x0, 0x2, 0x10, 0x2, 0x1, 0x8, 0xffffffff80000001, 0x8, 0x7, 0xff, 0x1, 0x6, 0x2, 0xfffffffffffffff7, 0x9, 0xffff, 0x3, 0xa6, 0x0, 0x1, 0x1ede, 0x1, 0x101, 0x1, 0x5, 0x1, 0x8, 0x2, 0x7, 0xffffffffffffffff, 0x6, 0x84, 0x0, 0x100, 0x0, @perf_config_ext={0x2, 0x10000}, 0x8042, 0x46, 0xd072, 0x0, 0xfffffffffffffff8, 0xfff, 0x1}, r1, 0x6, r2, 0x1) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x9, &(0x7f0000000600)=[{&(0x7f0000000100)="5e8e7f764a85ab48a161af16cff29c8f6f0b9bec9581df309e321067c3e9b02a5bc6", 0x22, 0x96e}, {&(0x7f0000000140)="9fe397fa17316f127d5de375c26b8e0509a8add53fe416601eba0bac93d2d686db01f3644b5951b72368bca7622a2bf4c1b8fe4d226e87bcd138bc755de696fc7ed9a1096e76d666500f55df2f8a2519c231b86f8598c0d7657a05a47755029bdf33e50c299ab54b08a6857b3372ccd8045ae51cc6c76b0eed6a76f65d36bbbf85cb0c73cf810c32f8ab5a9374c7908414db8e76c935575b1f6869f6c5ee1b2fe7c85e85d7b86b4b698b6b36c34295213bd5e18d3e45e170c6971a823f6ddd5e", 0xc0, 0x1}, {&(0x7f0000000200)="799cfc4ec924cbd33596e1a92285b6efeb9e95a3d51804b90209068f9dbfbec03c09195b6eb9989cbd0a3d65c4aaf934555ddb13e3d5b8be3a116dbebcedec89256537ce9d92cc279c", 0x49, 0x1f}, {&(0x7f0000000280)="23b5bd6f9fbab69124c064ea30ae4eb7dce5f7601bb71ad3ce98bdf8d145494ecddb6bb89ceda048ce84262b5e43314b796ff7490d6720594c41df4fa36706791f20a2fef5b3198c8b77f9dc977447fff78746822035ee", 0x57, 0x1}, {&(0x7f0000000300)="edeb7fa692a7447fb7c35b0519e0d2a9e010bffe23582a22e0049d96f5a746571879a374a5c60cb9d650825a612d7aa14c0404414923b0341fffc35d7bb6f8cd09ff688e1455ffca7c1357bfa147e3d13266f02d3b91e168d28fdcf9141005f2f3094124e46f690d781471b623228a", 0x6f, 0x80000000}, {&(0x7f0000000380)="e4157b2551aa4fef4db7135b84a17db92610d31f895fd706362ebc522d693e274d0c569e63d33442ae4a14bdafb1e014bd6e39187a", 0x35, 0x4}, {&(0x7f00000003c0)="154736a6fa1141471ff36aa7f8d4622486581032870c705e07c893bddacb2efe799ec803b08af9f9e0ed1da1bb2c96e4fcb3efcd0604f0475811beb6e4635d94e30e8dfabdc13960b6ddf3f893010aa31a1858a611ef10c93ed0df3a9356a82708bcd239416fc2a82887688f7b18cd345b09ef27a1b9a6a7056c7daca727cf82a42fec267c", 0x85, 0x6}, {&(0x7f0000000480)="07c709a8b89e254c1352e4cf86166b44d5b084e4c28721d7ced7f8738669b2f1bf9ddde78b714ca1ed9e9b50c9961c37eb9e64d598abffed2154a3e780587ae56a771d7e665c16c31cac7300fd0a159a58", 0x51, 0x100}, {&(0x7f0000000500)="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", 0xfb, 0x80000001}], 0x1, &(0x7f0000000700)={[{@uqnoenforce='uqnoenforce'}, {@lazytime='lazytime'}, {@gquota='gquota'}, {@gqnoenforce='gqnoenforce'}], [{@uid_lt={'uid<', r0}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000980)) 11:02:58 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:02:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000100)}, 0x20) 11:02:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x0, 0x0}, 0x2c) [ 1331.113741][ T659] XFS (loop4): Invalid superblock magic number 11:02:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x7f, 0x0, &(0x7f0000000000)=0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:02:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000100)}, 0x20) 11:02:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x0, 0x0}, 0x2c) [ 1331.548140][ T849] XFS (loop4): Invalid superblock magic number 11:03:06 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:03:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x6, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe59, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) r5 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) unlink(&(0x7f0000000640)='./file0\x00') recvmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f00000009c0)=@can, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a40)=""/124, 0x7c}, {&(0x7f0000000ac0)=""/16, 0x10}, {&(0x7f0000000b00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000cc0)=""/254, 0xfe}, {&(0x7f0000000dc0)=""/20, 0x14}, {&(0x7f0000000e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e80)=""/203, 0xcb}, 0x10002) sendmsg$kcm(r5, 0x0, 0x20000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000300)={r1}) socketpair(0x2, 0x20000000000001, 0x0, &(0x7f0000000980)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x7, 0x1, 0x9, 0x9, 0x1, 0x80000000, 0x2, 0x0, 0x0, 0x2, 0x9, 0x7cc, 0x7, 0x2, 0x0, 0x0, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x3, 0x0, 0x9, 0x40, 0x80000000000002, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x8, 0x0, 0x2, 0x2, 0x39c}, r6, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x0, 0x0}, 0x2c) 11:03:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) 11:03:06 executing program 3: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) socketpair$unix(0x1, 0x10000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000061128000000000009500000000000000a6a28d588dd759230c6ad67052c666ed1b8d9586e611a02ca4fd9eb3251e0ef30f7fd490ddf91d680e54db9295a2aabf7f12220000000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r1) 11:03:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10040, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x4, 0x4) 11:03:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) 11:03:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000061100, 0x500001c) [ 1338.424533][ T1014] XFS (loop4): Invalid superblock magic number 11:03:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) 11:03:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1338.558494][ T27] audit: type=1804 audit(1564916586.384:37): pid=1164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir655964718/syzkaller.oIxpqq/1812/memory.events" dev="sda1" ino=16769 res=1 11:03:06 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x10000, 0x6100) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) [ 1338.744230][ T1260] Unknown ioctl -2147199775 11:03:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:03:15 executing program 3: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) socketpair$unix(0x1, 0x10000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000061128000000000009500000000000000a6a28d588dd759230c6ad67052c666ed1b8d9586e611a02ca4fd9eb3251e0ef30f7fd490ddf91d680e54db9295a2aabf7f12220000000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r1) 11:03:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x5000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:15 executing program 0: 11:03:15 executing program 1: 11:03:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/btrfs-control\x00', 0x400100, 0x0) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000002600)='/dev/video36\x00', 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000002680)={&(0x7f0000000400)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001540)="a637ecafbb4bb6c58399b279dbc3fbbe8a988b1a1353034b1252ed577b9ad98c157f39197e3ae960701faf744132fdf078b817721222c9945aa8beea43bcb90feaef91e62af7e57ef9c41b52dea537602da87c7b5a1480bdbfe6542e323f20fc422bb644ac6a15fd08e2bde6c8267d936c87e3060084b04edb7dced9c9bc4eca384c9975dc3b29ade9e86069d318ba0396bd265d10", 0x95}, {&(0x7f0000001600)="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", 0x1000}], 0x3, &(0x7f0000002640)=[@rights={{0x18, 0x1, 0x1, [r1, r2]}}], 0x18, 0x240000c0}, 0x0) lsetxattr(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)=@random={'system.', 'T[proctrusted\x00'}, &(0x7f0000000100)='eth0nodev/\x00', 0xb, 0x1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x3ffffd, 0x0) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000001c0), 0x2) dup(r3) symlink(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='./bus\x00') open_tree(r3, &(0x7f0000000180)='./bus\x00', 0x1100) lremovexattr(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)=@known='trusted.overlay.upper\x00') r4 = creat(&(0x7f0000000140)='./bus\x00', 0x1) timerfd_settime(r4, 0x1, &(0x7f0000000280)={{0x0, 0x989680}}, &(0x7f00000002c0)) 11:03:15 executing program 0: 11:03:15 executing program 1: 11:03:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x6000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:15 executing program 3: 11:03:15 executing program 1: [ 1347.743639][ T1486] XFS (loop4): Invalid superblock magic number 11:03:15 executing program 0: migrate_pages(0x0, 0x36, 0x0, &(0x7f0000000980)=0x1) 11:03:23 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:03:23 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x7000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') read$FUSE(r1, 0x0, 0x9a) 11:03:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x40, 0xfffffffffffffe8d, 0x0, 0x0, &(0x7f0000000100)) 11:03:23 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321212c0f0df81f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="81ebcf849c2959338574d21eb2be0266f7dcf933b3f020468a85f5e699f6b7744ae2eded26dd7737145d5d87a17d372d69591c3e50cf71a61b30649b8d933fd4c61094220232889cdb5a837a1ad5fa6a49187dc2f81b121f9c0b01930debd8bc5b558bf7ba539faae7824e354dcfa5321251645e7d3c751abe1ef64d1d1fd82b24d9b9925c63af951a9c1260b41d13f665c24c2facfccb"], 0x1a000) syz_genetlink_get_family_id$ipvs(0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [], 0x32}, 0xb) 11:03:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 11:03:24 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x8000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x80) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x53, "5f5c293a1e99e867bd64cd64480261700b2e6fc0654e2a257ac4cf344b10c05688a12b385c3881cc60e2a7784cb0540d550d019c3cd0585f1ed8f58e51bc65b6790a7ee946ca55d4c865cffca6d9219493e29a"}, &(0x7f0000000140)=0x5b) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x8, 0x8, 0x8008, 0xffffffff00000001, 0xa8, 0x8, 0xfffffffffffffff7, 0xfffffffffffffffc, r1}, 0x20) 11:03:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x0, 0x0, 0x0, @sint}]}) 11:03:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) [ 1356.364092][ T1738] XFS (loop4): Invalid superblock magic number 11:03:24 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xa000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e24, @multicast2}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000000), 0x4) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r3, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r3, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000700)={&(0x7f0000000580)={0x114, r2, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b55}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa09f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x202}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe898}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xec}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x114}}, 0x48000) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 11:03:33 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:03:33 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = getpid() getresuid(&(0x7f0000005fc0), &(0x7f0000006000), &(0x7f0000006040)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006080)={0x0, 0x0, 0x0}, &(0x7f00000060c0)=0xc) sendmsg$unix(r0, &(0x7f00000061c0)={&(0x7f0000004c80)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000005f40)=[{&(0x7f0000004d00)="933fc53b905d13b0635a9c521c1c513a521bbaeed05c7c2347e231afb142b8684afbe411d66c5077562d680a4fcaa83513c76eef3aa70d91d21f6881672dcdac69cd6e7c732554eed42fa284b461ff44943fd1176e6ab42f5f3d89f1ab2e81d7d8daa4a00b13d8af2c24706d056af0d9ce4bfcd962331b", 0x77}, {&(0x7f0000004d80)="1b2237f79443e4f5dd0544a4d71897db0ae58b2d36069aaf4eb2eb95b9bb733d0b6cf257fcb697b7027ffd7a4b0709e73ac9aa34226998b0340e7b36bc98edb2f90ab75efc07d6a853d7c60ea717d89407059062973811a42d04ddc49e65bd75d4d17905cd43ea92808e3d05841a72e3f9ce3384a204a65e0905399b41782749819d409d76e4d5f1d130e7", 0x8b}, {&(0x7f0000004e40)="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", 0x1000}, {&(0x7f0000005e40)="9472b19a2770981ce4a0f4fab8880fa574239875353b4c850487ff66af28c3326b58921530e8b1cc31f1c346a975def9a6e22ae1f14c4971ca9a9257dc3aa1", 0x3f}, {&(0x7f0000005e80)="e00c5876590b972bc39b854e67183406c8107cd0d89191ca5d1c777d4a6bf0214ea5a513fe98e299bdc52e222574cbe0d7c2a04239187d66295433195b3a5bf4283f8ec25bb6045d1e5640aee8f3197117168484bed7c7b3c3aee13604fb0bc56e916258ec80e374e0343e3889e7ef8669abcd1671b6028fda714d004fa5ede72d275f661af16ea7aff225e5babe580def474b59a560", 0x96}], 0x5, &(0x7f0000006100)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x90, 0x80}, 0x20000800) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000d40)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006200)=ANY=[@ANYBLOB="75716e8f00000000000000000059efa3ff08f6ab590ae48cf0893ec89671cb5bbfb3"]) recvmmsg(0xffffffffffffffff, &(0x7f0000004a40)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000680)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f0000000140)=""/212, 0xd4}, {&(0x7f0000000240)=""/243, 0xf3}, {&(0x7f0000000340)=""/117, 0x75}, {&(0x7f00000003c0)=""/188, 0xbc}, {&(0x7f0000000480)=""/80, 0x50}, {&(0x7f0000000500)=""/68, 0x44}, {&(0x7f0000000580)=""/104, 0x68}, {&(0x7f0000000600)=""/87, 0x57}], 0x9}, 0x10001}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000740)}], 0x1, &(0x7f00000007c0)=""/30, 0x1e}, 0x80000001}, {{&(0x7f0000000800)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000000880)=""/45, 0x2d}, {&(0x7f00000008c0)=""/182, 0xb6}, {&(0x7f0000000980)=""/205, 0xcd}, {&(0x7f0000000a80)=""/161, 0xa1}], 0x5, &(0x7f0000000bc0)=""/191, 0xbf}, 0x9}, {{&(0x7f0000000c80)=@ax25={{0x3, @rose}, [@null, @bcast, @null, @bcast, @remote, @bcast, @bcast, @rose]}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/36, 0x24}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000000d40)}, {&(0x7f0000000d80)=""/99, 0x63}, {&(0x7f0000000e00)=""/171, 0xab}, {&(0x7f0000000ec0)=""/62, 0x3e}, {&(0x7f0000000f00)=""/103, 0x67}, {&(0x7f0000000f80)=""/45, 0x2d}], 0x8}, 0x9}, {{&(0x7f0000001040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001100)=[{&(0x7f00000010c0)=""/36, 0x24}], 0x1, &(0x7f0000001140)=""/175, 0xaf}, 0x7ff}, {{&(0x7f0000001200)=@vsock, 0x80, &(0x7f0000001440)=[{&(0x7f0000001280)=""/58, 0x3a}, {&(0x7f00000012c0)=""/199, 0xc7}, {&(0x7f00000013c0)=""/103, 0x67}], 0x3, &(0x7f0000003540)=""/4096, 0x1000}, 0x2ab4ef54}, {{&(0x7f0000001480)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000004600)=[{&(0x7f0000004540)=""/163, 0xa3}], 0x1, &(0x7f0000004640)=""/66, 0x42}, 0x6}, {{&(0x7f00000046c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000004740)=""/199, 0xc7}, {&(0x7f0000004840)=""/167, 0xa7}, {&(0x7f0000004900)=""/164, 0xa4}, {&(0x7f00000049c0)=""/9, 0x9}], 0x4}, 0xfffffffffffffff8}], 0x8, 0x100, &(0x7f0000004c40)) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000000740)) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000001500)=""/62) 11:03:33 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xc000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:33 executing program 0: mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f00000003c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 11:03:33 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:03:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e24, @multicast2}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000000), 0x4) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r3, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r3, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000700)={&(0x7f0000000580)={0x114, r2, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b55}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa09f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x202}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe898}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xec}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x114}}, 0x48000) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) [ 1365.467331][ T2199] XFS (loop4): unknown mount option [uqn]. 11:03:33 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xe000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e24, @multicast2}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000000), 0x4) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r3, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r3, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000700)={&(0x7f0000000580)={0x114, r2, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b55}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa09f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x202}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe898}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xec}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x114}}, 0x48000) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 11:03:33 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:03:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e24, @multicast2}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000000), 0x4) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r3, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r3, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000700)={&(0x7f0000000580)={0x114, r2, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b55}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa09f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x202}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe898}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xec}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x114}}, 0x48000) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 11:03:33 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xf000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) [ 1365.923222][ T2332] XFS (loop4): unknown mount option [rce]. [ 1366.005661][ T2332] XFS (loop4): unknown mount option [rce]. 11:03:42 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:03:42 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:03:42 executing program 0: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8910, &(0x7f0000000040)='li\x00\x96o\xd6Q\xb9Y\xa9\xffJ,\x00\xd2\x97\x04\']\x00\x99\t\xcb5\xff\xff\xb7E\xf5\xcaC\x1c9T\xee\xd5D\x11\xed~m=^\\?\x83-\xe6\xc8d\xd4\xfeH\xed\xe0\xcb{n ') 11:03:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x10000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x4400, 0x0) 11:03:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x107900, 0x1) recvfrom$unix(r0, &(0x7f00000000c0)=""/132, 0x84, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 11:03:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x14000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:42 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:03:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0xffa) [ 1374.894414][ T2354] XFS (loop4): Invalid superblock magic number 11:03:42 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x84a40) 11:03:42 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460006090608000100000002000300060003000000c7010000380000008a000000060000040100200002000400001003000000000003000000ff010000000000008162b50028663f8bbd00000009000000ffffffff0700000009001500000000600500000005000000e08d650f0200000000000000"], 0x78) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @loopback}, 0x2, 0x4, 0x3, 0x2}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="aaa9ee1641e86a27ca430e010b08c0a439f128d3f5670bc004522fddeaaee1136e23abfde3eab812aa8b52a44eaf15a1490ea0f0cbc998c49b6c31ee0ff37b9b12e7927da64f03927f9680efeffaa860ee49bc91c00eb8a7adc81645c641fa55d6e04fe2172e175e79c7a039a3236b32c9ba93e2ad4b6f41a6334d06fb0c6da1", 0x80}], 0x1, &(0x7f0000000240)=[{0x60, 0x0, 0x81, "9da8cfa76bdccb3b1b472bd03dee7f95da31abf318d5094320c5b86941ccfd9ddcc15712f22bee749d5e7026f0728284e0a42bc72a7c65b8bf6f48dd0407dc97822fc1d5138cfb925eb6e9b72cc9ba"}, {0xb8, 0x11f, 0x7ff, "2c6d244a4ae61b381cb3ed2096d5443b4315627f762340e079183d7a90fca0aff4e4bb51071233534d0f02183308970c0de852249c1c3cf940b0b1e510436be0158445c90d18910c2aed45032b1f560d1543e1b29d4e1d670b2ed8bf2d26ea294ed07333d494897483341a4ab03ca0d8a5ee448dd1766aa24211acfe00a3a5edfdfc37c4bad5dcc86391aaa139b044e250723a25eeb4501fc557e6da579497fc5eed"}], 0x118}, 0x4000010) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7532b52d758e17dde0c80ca7c0755e5d24716e7f7263652c0000000000"]) prctl$PR_SET_PDEATHSIG(0x1, 0x1f) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x900, 0x0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f00000000c0)={0xf, {0x7, 0x80, 0x95, 0x80000000}}) 11:03:42 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) [ 1375.254022][ T2592] XFS (loop4): unknown mount option [u2-u u^]$qnrce]. 11:03:49 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:03:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0xffa) 11:03:49 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x18000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1d) 11:03:49 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:03:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='uq,\x00']) r0 = shmget(0x1, 0x1000, 0x400, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) openat(r1, &(0x7f0000001140)='./bus\x00', 0x200, 0x279a040bc36fe20) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f00000000c0)) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000100)={0xae0, 0x1000, "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"}) 11:03:50 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:03:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0xffa) [ 1382.214418][ T2723] XFS (loop4): unknown mount option [uq]. 11:03:50 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1b000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:03:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz1\x00'}, 0x45c) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)) 11:03:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@logbufs={'logbufs', 0x3d, 0x7}}]}) mount$9p_virtio(&(0x7f00000000c0)='[posix_acl_access$proc\x00', &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='9p\x00', 0x100c00, &(0x7f0000000180)={'trans=virtio,', {[{@cache_mmap='cache=mmap'}], [{@hash='hash'}, {@subj_user={'subj_user', 0x3d, 'eth1vmnet1-'}}, {@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef', 0x3d, '}!*'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) 11:03:57 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:03:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0xffa) 11:03:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1c000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:03:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0xffffffea, 0x0, 0xfffffffffffffffd, &(0x7f00000000c0)={[{@uqnoenforce='uqnoenforce'}]}) 11:03:57 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) fremovexattr(r0, 0x0) 11:03:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:03:57 executing program 4: 11:03:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) 11:03:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x23000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:03:57 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000200)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000001c0)='./file0\x00') chroot(&(0x7f0000000040)='./file0/file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x4) 11:03:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75716eff000000000000002c00a983e9247ede98c576259c5fe48dcaba6831b2076cd5a10d8ea1d3a6aa68140d1ae24ee141a79a5370bca68f2909d755fc621b73d05e6e588f431979d13004ebdfb12d39082753f2bb35efff3c2a7b"]) init_module(&(0x7f0000000000)='xfs\x00', 0x4, &(0x7f00000000c0)='xfs\x00') [ 1389.911151][ T3237] XFS (loop4): unknown mount option [uqn]. 11:04:03 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:04:03 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2b000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:03 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:04:03 executing program 0: 11:04:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x0, 0x0, @pic={0xffff}}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="d50c6077000000000000afe17f7181d2c231d20b34d7b747cf50aa7d0d99bf66aff5d9349c16b65e843dcb165e36ab42519e48a256b1640520b0b93f6ea1dd34697b1e5d0a"]) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) 11:04:03 executing program 3: 11:04:03 executing program 0: 11:04:03 executing program 3: 11:04:04 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:04:04 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2c000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1396.161400][ T3483] XFS (loop4): unknown mount option [ `w]. 11:04:04 executing program 0: 11:04:04 executing program 3: 11:04:10 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:04:10 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:04:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000001b80)='./file1\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) removexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001a00)=""/20, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 11:04:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./bus/../file0\x00', 0xad, 0x18, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0)={[], [{@pcr={'pcr', 0x3d, 0x2d}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x31, 0x39, 0x36, 0x66, 0x39, 0x77], 0x2d, [0x77, 0x77, 0x73, 0x77], 0x2d, [0x3f, 0x62, 0x0, 0x62], 0x2d, [0x33, 0x75, 0x31, 0x38], 0x2d, [0x63, 0x77, 0x73, 0x39, 0x77, 0x34, 0x3a, 0x77]}}}, {@smackfsroot={'smackfsroot', 0x3d, '\xed-'}}]}) r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x1, 0x800) accept4$llc(r0, 0x0, &(0x7f0000000200), 0x0) 11:04:10 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2f000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x4, &(0x7f0000b56f40)=""/192, &(0x7f0000000080)=0xc0) 11:04:10 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x402, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000000c0)={0x1, 0x8}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:04:10 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 11:04:10 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x30000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000001b80)='./file1\x00', 0x20) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) removexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="62742ba689434a90569f9311"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f00000019c0)={0x9, 0x296, [0x400, 0x1f]}) lstat(0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 11:04:10 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x34000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1402.691149][ T3666] overlayfs: filesystem on './file0' not supported as upperdir [ 1402.715138][ T3678] XFS (loop4): Invalid superblock magic number 11:04:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000001b80)='./file1\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) removexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001a00)=""/20, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) [ 1402.891124][ T3759] overlayfs: conflicting lowerdir path [ 1403.028204][ T3945] overlayfs: conflicting lowerdir path 11:04:16 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 11:04:16 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x38000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="75b96e6f656e666f7263652c007149ecb991ac"]) 11:04:16 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000001b80)='./file1\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) removexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001a00)=""/20, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 11:04:16 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:04:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000001b80)='./file1\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) removexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001a00)=""/20, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 11:04:16 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3c000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:16 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) [ 1409.110316][ T3988] XFS (loop4): unknown mount option [unoenforce]. [ 1409.132544][ T3986] overlayfs: conflicting lowerdir path [ 1409.156487][ T3984] overlayfs: conflicting lowerdir path 11:04:17 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x64}}) 11:04:17 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3f000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:17 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000001b80)='./file1\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) removexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001a00)=""/20, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) [ 1409.255601][ T3988] XFS (loop4): unknown mount option [unoenforce]. 11:04:17 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff}) sendmsg$netlink(r0, 0x0, 0x0) 11:04:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="ef79c5527cf80dbd7f79a733e91e80abcecab4b0c29f52c3eed6453614"]) 11:04:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000001b80)='./file1\x00', 0x20) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) removexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="62742ba689434a90569f9311"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) lstat(0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 11:04:17 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x40000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:17 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff}) sendmsg$netlink(r0, 0x0, 0x0) [ 1409.552704][ T4024] XFS (loop4): unknown mount option [yR| y3ʴŸRE6]. [ 1409.607427][ T4014] overlayfs: conflicting lowerdir path [ 1409.625567][ T4021] overlayfs: conflicting lowerdir path [ 1409.641284][ T4024] XFS (loop4): unknown mount option [yR| y3ʴŸRE6]. 11:04:25 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:04:25 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff}) sendmsg$netlink(r0, 0x0, 0x0) 11:04:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:04:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x47000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000f6ff0000"], 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000300)={@loopback}, 0x14) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) epoll_create(0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[&(0x7f0000000100)='\x00', &(0x7f0000000340)='vmnet0wlan1GPLsystemcgrouptrustedcpusetcpuset(^vboxnet0%\x00', 0x0, &(0x7f00000003c0)='nodevvmnet0selinuxnodevmime_type\x00', &(0x7f0000000400)='self)vmnet1(-\x00', &(0x7f0000000480)='eth1\xfd&trusted\x00'], 0x0, 0x1000) 11:04:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000040)) close(r0) 11:04:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x48000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:25 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) 11:04:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000040)) close(r0) [ 1417.766210][ T4161] XFS (loop4): Invalid superblock magic number 11:04:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4b000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="31819c1aeec1fae46ec9b69096eff524d2d2ffff0000"]) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x20000000003f, 0xa000) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000140)={0x3, 0x1}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x105a01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f00000000c0)=0x100000001) 11:04:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000040)) close(r0) [ 1418.114193][ T4290] XFS (loop4): unknown mount option [1nɶ$]. 11:04:34 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:04:34 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) 11:04:34 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x61000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000040)) close(r0) 11:04:34 executing program 4: 11:04:34 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0xffffff8d]}}, 0x80, 0x0}, 0x0) 11:04:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1427.126550][ T4408] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:04:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='trusted./vmnet0-\'\x00') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) 11:04:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000040)) 11:04:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x63000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:35 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) 11:04:35 executing program 3: socketpair(0x14, 0x0, 0x0, &(0x7f0000000040)) [ 1427.348004][ T4420] XFS (loop4): Invalid superblock magic number 11:04:44 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:04:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt6_stats\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) 11:04:44 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 11:04:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x71000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:44 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 11:04:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@can, &(0x7f0000000000)=0x80, 0x80800) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x7f, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xe8) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./bus\x00', 0x6, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="8e1c8b2c4a8f471704e717d39140ebd68607d7eec61613035d3bb1c97f16b1dce15a3f1526645d243fc527ec43390c40880ed237474ee77478e8f24400a29fa5c73bd1618b65c3642a1ead657a1d28ebb1f938c9b536a57249f1f1833bfdcb103f94f53c29ef2d6acd313a0c38cb6810ef550ac638eed276414d3892f3c396f99590c5603a59e06046a60684f75a7f3ec35f30f0ddd8ad7fff706d79b16e7d9a9ef3b57ce749", 0xa6, 0x8001}], 0x1000, &(0x7f0000000480)={[{@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}], [{@euid_lt={'euid<', r1}}, {@smackfshat={'smackfshat', 0x3d, 'uqnoenforce'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, 'uqnoenforce'}}, {@obj_role={'obj_role', 0x3d, 'uqnoenforce'}}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@measure='measure'}]}) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x1010, r3, 0x10000000) r4 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r4, &(0x7f0000000640)="b2bc58199eca0ba3a847cff53705d5e76575c77c308a23de17db1b40e7457db997b29de90226a623297e174319847f277ad03530dfdeff8141db46ca8ba4d4c2cccebe831ee82499da4c1f653e6959f57c79c63a97ff3fd50a6938a9840d6695e94bbddc71d497f9f4bb80e44dbeaf017dd613b6a5e7b763d111f0dc95fea9c91c78a810060bb05f9d9af1a70dccc36ba64a97367cf2fd8363637ab585765793be525685044858fbe3a2791259dd070a4e9df0b78fde8f24e942aa64a32732", 0xbf) ioctl$TIOCCONS(r2, 0x541d) 11:04:44 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 11:04:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x73000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:44 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 11:04:44 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 11:04:44 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) [ 1436.655897][ T4468] XFS (loop4): Invalid superblock magic number 11:04:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x85ffffff}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:54 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:04:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r0, &(0x7f0000000000)=0x3a, 0x3) 11:04:54 executing program 3: socketpair(0x14, 0x0, 0x0, 0x0) 11:04:54 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 11:04:54 executing program 4: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x8200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0xc00, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1f8, r1, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6a3c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x30000000000000}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) getitimer(0x6f25a4700b687376, &(0x7f0000000400)) 11:04:54 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x9cffffff}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:55 executing program 3: socketpair(0x14, 0x0, 0x0, 0x0) 11:04:55 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x10}}], 0x28}, 0x0) 11:04:55 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x9fffffff}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:04:55 executing program 0: [ 1447.345084][ T4617] XFS (loop4): Invalid superblock magic number 11:04:55 executing program 0: 11:04:55 executing program 3: socketpair(0x14, 0x0, 0x0, 0x0) 11:05:02 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:02 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x10}}], 0x28}, 0x0) 11:05:02 executing program 4: getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280)=0x0, &(0x7f00000001c0)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'user'}}, {@seclabel='seclabel'}, {@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', r0}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@measure='measure'}]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x111000, 0x0) setxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x80000001, 0xff}, {0x4, 0x3}]}, 0x14, 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f00000004c0)=0xe8) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./bus\x00', 0x3, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="c129522b0a608a1935e3372be6f2093d71534e1e74179bd39d", 0x19, 0x101}], 0x8010, &(0x7f0000000640)=ANY=[@ANYBLOB="7468726561645f706f6f6c3d307830810000003038302c667261676d656e743d616c6c2c6d61785f696e6c696e65010000000120000069743d309ef24256e678303030303030303030303030303030372c73757038fbdee35d723fdeaa78766f6c69643d3078303030303030303030303030303430302c696e6f64655f63616368652c7375626a5f747970653d756e636f6e66696e65645b752c7375626a5f747970653d656d310000000000000000", @ANYRESDEC=r3, @ANYBLOB=',appraise_type=imasig,obj_role=security.capability\x00,uid<', @ANYRESDEC=r1, @ANYBLOB=',smackfshat=sysadm_u,\x00']) 11:05:02 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xff000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:02 executing program 0: 11:05:02 executing program 3: 11:05:02 executing program 0: 11:05:02 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x10}}], 0x28}, 0x0) 11:05:02 executing program 3: [ 1454.529124][ T4759] XFS (loop4): unknown mount option [smackfsfloor=user]. 11:05:02 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xff9f0000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:02 executing program 0: 11:05:02 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:05:11 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:11 executing program 3: 11:05:11 executing program 0: 11:05:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="750b2623b1200044ccfbff2c63"]) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/btrfs-control\x00', 0x200400, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000600)={@nfc_llcp={0x27, 0x0, 0x0, 0x4, 0x8, 0x2, "334457b9383af8780c149e454a72b8d86d6ae94b945e543e646c5f0ae3a5c44a8c3af1b94b2c6d792100aec11233cfcdba4392cf6faa95ef2a0251bb722f41", 0x14}, {&(0x7f0000000540)=""/122, 0x7a}, &(0x7f00000005c0), 0x1}, 0xa0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x4, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="6b9bc7bd33f422b1e008ddfd9c5e12e790e02962811dca8588", 0x19, 0xb352}, {&(0x7f0000000180)="12f584455e1c6e779998e03ae7c6e6af3d71a3ad887c0fe4e8ab6469d010394f47fdf2e9888cb21572d41c8bf691b125e4364c430c38a656a6479622cd9a389972c5c13d9fd778ae6c93a5e24cf64fb79a35608608c786f16614ea35b0895c081767fd05a79e2dc060781fc4ec3d00ffa2ea184c544636b2bb04f18ee6a95d40fd30e9663e8c4e394fbd8af1417316751dc79107e00e5c58ba5aa9c58ec14dfd980ae09c072a434741b3be535ea7ea6a40fe70b45e82e8", 0xb7, 0x9}, {&(0x7f0000000240)="e1d9e3ce6dc78cc0d82b8463e6c29bf7c1a65aafa45f2a48465bd900aec2d2d879becab77aa105cc6a566660b3038dbc2b90bb8811c4a32dd22982daa51a2ab056b614fd095dab6260e797fcfc73ccba0b849a49206b376759dfcbe8b65551839a847f6b7a242296f9bf754c498e50b388ea1c26f66fe45ae04698dd7e1e27", 0x7f, 0x21c39f50}], 0x8002, &(0x7f0000000340)={[{@quota='quota'}, {@errors_remount='errors=remount-ro'}, {@init_itable='init_itable'}], [{@obj_type={'obj_type', 0x3d, 'xfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'mime_type!'}}, {@obj_type={'obj_type', 0x3d, 'xfs\x00'}}]}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000700)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x48, r2, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x10001000}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)={r1}) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000400)={@remote={[], 0x3}, 0xf, 'teql0\x00'}) 11:05:11 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xffffff85}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:11 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:05:11 executing program 3: 11:05:11 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) 11:05:11 executing program 0: 11:05:11 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xffffff9c}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1463.843618][ T4901] XFS (loop4): unknown mount option [u &# ]. 11:05:11 executing program 0: 11:05:11 executing program 3: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)={[{@fat=@tz_utc='tz=UTC'}]}) [ 1464.011649][ T4984] FAT-fs (loop3): bogus number of reserved sectors [ 1464.044561][ T4984] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1464.085186][ T4984] FAT-fs (loop3): bogus number of reserved sectors [ 1464.093887][ T4984] FAT-fs (loop3): Can't find a valid FAT filesystem 11:05:18 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:18 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 11:05:18 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xffffff9f}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000007c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 11:05:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="75716e000000000000000000000000e9ff0000"]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) getpeername$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) 11:05:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/118, 0x76, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) io_setup(0x3ff, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 11:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000007c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 1470.271185][ T5043] XFS (loop4): unknown mount option [uqn]. 11:05:18 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 11:05:18 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x20000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000007c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 11:05:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='uqnownforce,\x00']) [ 1470.708663][ T5279] XFS (loop4): unknown mount option [uqnownforce]. [ 1470.760786][ T5279] XFS (loop4): unknown mount option [uqnownforce]. 11:05:25 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:25 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 11:05:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x60000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:25 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) r2 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r1, r2, 0x0, 0x102002700) 11:05:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_NMI(r0, 0xae9a) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) fadvise64(r0, 0x31, 0xc74, 0x4) 11:05:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:25 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x28}, 0x0) 11:05:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x100000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1477.665362][ T5297] XFS (loop4): Invalid superblock magic number 11:05:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:25 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x28}, 0x0) 11:05:25 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:32 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:32 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x200000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) lstat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) mount$fuse(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='fuse\x00', 0x2, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@permit_directio='permit_directio'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'xfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'uqnoenforce'}}]}}) 11:05:32 executing program 3: keyctl$search(0xa, 0x0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:32 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x28}, 0x0) 11:05:32 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:32 executing program 3: keyctl$search(0xa, 0x0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:32 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:32 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:05:32 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x300000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:32 executing program 3: keyctl$search(0xa, 0x0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=ANY=[@ANYRES16]) [ 1485.102680][ T5576] XFS (loop4): unknown mount option []. [ 1485.206601][ T5576] XFS (loop4): unknown mount option []. 11:05:40 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:40 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:05:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:40 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x400000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:40 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='uqnoenforcu,\x00']) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200101, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) [ 1493.143409][ T5595] XFS (loop4): unknown mount option [uqnoenforcu]. 11:05:41 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:41 executing program 1: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 11:05:41 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:41 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x500000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="68c44ce99c7a1a880000040cd000"]) 11:05:41 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) [ 1493.549964][ T5725] XFS (loop4): unknown mount option [hLz]. [ 1493.632610][ T5725] XFS (loop4): unknown mount option [hLz]. 11:05:50 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:50 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x600000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:50 executing program 1: 11:05:50 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="75716e6f656e668f7263652c00"]) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00fb2b0405c188a2771d3d85a9ed87db31366ec79f2f3ce6c30a00000000000000db060000000000000000"], 0x2b, 0x1) 11:05:50 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:50 executing program 1: 11:05:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:50 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x700000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:50 executing program 1: [ 1502.476964][ T5745] XFS (loop4): unknown mount option [uqnoenfrce]. 11:05:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:56 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:05:56 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="0180000000000000d000002c00"]) 11:05:56 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x800000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:05:56 executing program 1: 11:05:56 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:56 executing program 3: add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:05:56 executing program 1: [ 1508.711508][ T5884] XFS (loop4): unknown mount option []. 11:05:56 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:05:56 executing program 1: 11:05:56 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xa00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1508.839593][ T5884] XFS (loop4): unknown mount option []. 11:05:56 executing program 3: add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:06:05 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f00000000c0)='./bus\x00', 0x2, 0x4, &(0x7f0000000440)=[{&(0x7f0000000100)="19da26a355025a3897f20f75f0806a9aae4990015beccc7c1989f6968c9047623c961e5557a94e9470e34ace4e5757c8954aadbea8856d6f24bb6aa4d719775749d54f0ed9db93cf7029e3c762e3ed8bea3082aeb985858efe7c3a87c9dea2015704e1043238e419a6ec48461c260b688b8ad87bc5d32de75df65fe84b37", 0x7e, 0x4}, {&(0x7f0000000180)="7d2c5d399a1db2844e8d2c932754ddf32dbd391cf0adfb3ae1634270302a0ea07b6c4992db6d634294c27ff966aa1b6ad1bd8d972762c4e178aadb3194369f366d51ea6689ce67f72260d709876aaae1a72bb29b12ee17378020e39c0695d6f8e6de8cf8bbdb2f5037034b890573a4f0623bc5dd4e0c988952f0272f278fbfcc2ced26d46db2bf8099fd4567b949229978e56a32263be9b9984336b4c34d11ed49b3fa19489939412c43e956174e00b916d8d7b32f6a7a9a3ea1626850373f6e85ebb1043cc1e5ef0aca31f4a08bbd28ef5b8a59346630c29b043482ad100c1e081f427b5821cd603ee0a2fb7820dd58808c3a83e96f", 0xf6, 0x8}, {&(0x7f0000000280)="eb4209703c5ca26b03b3c961b9e156777e47be6557a55dcb39153fbe33850bb359f1b153da71b65775a6ca75230f5449080ebeedc9d05840224b916859f7779cad6ca38718a8b75db5099cf3cd647ea8b196b574f2fbcfed2645da917f068105b8a119a8465aee82d5672dc55e724e7f33c65a6b0a5ff8a3cf34866a7e636bceaebfda5c11a20e61e4230ec239f655df80d751ac4bac6738e6073a9cbd13924b95eff9f4759f63bbc00d4f3cd6d1bebf1edf4dfc3d1502cb37d12e9afbbeff0228c5a701f0e9b3477b710af14afc6fbdb13a6d89", 0xd4}, {&(0x7f0000000380)="5689e30c1b43e0c08327f37c69aa57b12d36b27d13af6cf8ea8539cb71efad5da8a01d391ace7886a714fc1dceb8bd0491f62b0cd59294c876e061170c10dbcc41b802b7a58558225235c8cf41939bf82c491eb58e61127736e1d8edf1df3f856c777b13354e3a47a30670bca0873e729cd1e4814f18723fd06e769e1645004088d16090fca3a8", 0x87, 0x1}], 0x8, &(0x7f00000004c0)='uqnoenforce') 11:06:05 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:06:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mq_open(&(0x7f0000000100)='ppp0eth0\x00', 0x0, 0x0, 0x0) 11:06:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xc00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:06 executing program 3: add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:06:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xe00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, 0x0, &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:06:06 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) [ 1518.340090][ T5927] XFS (loop4): Invalid superblock magic number 11:06:06 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 11:06:06 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001200)=""/24, 0x18}], 0x1, 0x0) 11:06:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xf00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, 0x0, &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:06:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) 11:06:13 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) 11:06:13 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1000000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:13 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:06:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, 0x0, &(0x7f0000000600)={'syz', 0x2}, 0x0) 11:06:13 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1400000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:13 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) [ 1525.538196][ T6280] XFS (loop4): Invalid superblock magic number 11:06:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', 0x0, 0x0) 11:06:13 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x2}, 0x8) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="b0"], 0x1) 11:06:13 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) 11:06:13 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1800000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8d, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0xfff}}, 0x18) 11:06:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', 0x0, 0x0) [ 1526.049089][ T6463] XFS (loop4): Invalid superblock magic number 11:06:22 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:22 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1b00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0), 0x0, 0x0) 11:06:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000005c0)='keyring\x00', 0x0, 0x0) 11:06:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 11:06:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x100000000001, &(0x7f0000001500)) 11:06:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000061159c00000000009500000000000000b8b6c6b9414699baf09ddd421016f685fa36a1a0ca6b29d1749ab9860195c6b8ebe1849f6e8aca50a891a553a25d371ad54e2ec55174e09e48b9412b6899b179cd8f074eb23f005dd797ea86a1c34bca8bbf023d1814fc35d6252752aaaa948a15e31e0d605618cf1ec361496c0abaa84bc91430096b822cfa1e4e38d886e28d5d304d61fc17b99d746b83fe4de830d6c26164b716e91314fc39bb2c28231411dd6b7f"], &(0x7f0000000100)='GPL\x00'}, 0x48) 11:06:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0), 0x0, 0x0) 11:06:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x22) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0xfff, 0x0, 0x4}) 11:06:22 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x1c00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:22 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getuid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00') fallocate(r0, 0x0, 0x0, 0x4) 11:06:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0), 0x0, 0x0) 11:06:29 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(&(0x7f0000000440)='./file0/../file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) setxattr$security_smack_transmute(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x4, &(0x7f0000000540)=[{&(0x7f0000000200)="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", 0xfc, 0x7}, {&(0x7f0000000300)="f95d4dc2887f48320fa8fa534447a2631b2d7e828aa609b82d34ad79566e7a7fc8e62223316f7059f8a78d23836eafdedf7c33936aa0cf44ce20bc1be71f83498dc2ac994ecfd0fb5812ea525162336acf4b025a98c4dd441df37d974f19fd21cd5d6765b34335576f8c6afa0cb3e7a35927993dcae08235899900c8b4fde8b39166e5cff0c77b54ae659c23354b07c1b1", 0x91, 0x8}, {&(0x7f00000003c0)="b84b7fba4a8bcaaf18b6e43617fd633352400810e32ebccfcbaf006de70040ca3210980291c5bb85e881df5bb7386dc8e7e0b3ddc9ddff5e693d8bc4185fe24e4556e27fa766687df9d75c1a70c1653c4d398874dd29f2342b33a8dd5b78def7a3e8d15214c0389d7640ab709f212a93c665403e09b1592404a07675a64f4d7ff2eeadbe4e5dc1c76299abe5dc3b07cdfc354b1bfef35f17d506c37ac81fc98a124c0a7c17e75925a90419e93f4f3f50aa785196bc7916b7d0a8493af8cd97fc83a164e7f845c0b0aee44b1c0dc0a97b1e0ff3632ec2c6a063300bafe290d2", 0xdf, 0x6}, {&(0x7f00000004c0)="80b369f3a7b4d4433db34447d97f2ec470dce8a40da0a2cd52d580fc26082c9345c02f434ece3f8c1f0281825ae0b5b4b3a1be5c18f2a39f2c5b01541f71d8d0f88257924200162f99fb8b75581e703121d33070cea0674f464b2699782d00093e14d5eccb2b6d5901e9cdbf18", 0x6d, 0x2}], 0x10, &(0x7f0000000700)={[{@nobarrier='nobarrier'}, {@noalign='noalign'}, {@swidth={'swidth', 0x3d, 0x5}}, {@attr2='attr2'}, {@nolazytime='nolazytime'}, {@nolargeio='nolargeio'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat={'smackfshat'}}, {@pcr={'pcr', 0x3d, 0x23}}, {@appraise='appraise'}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor', 0x3d, '](loem0:user%'}}, {@smackfshat={'smackfshat', 0x3d, 'TRUE'}}, {@euid_gt={'euid>', r1}}]}) 11:06:29 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{0x0}], 0x1, 0x0) 11:06:29 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2300000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e0bcfe87b0071") syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="25bca274769a8ba2b82ab9e1cd8b612687463915e388e63bd854155a1bd5be42982f98b50000000070146d0e02064950a8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@i_version='i_version'}]}) 11:06:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000700)={0x67446698, 0x0, 0x0, 0x0, 0x0, "512b25abc074f544a452834a597b941744bf329db9a537879784c547aacfb0f0e0"}, 0x31) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x8100000, 0x0) 11:06:30 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2b00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:30 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{0x0}], 0x1, 0x0) [ 1542.256879][ T6896] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 1542.272330][ T6891] XFS (loop4): Invalid superblock magic number 11:06:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="bf16000000000000b7070000010010002000000000185819bc700000000000009500000000000000457717dbd0ca1c6fa7bf22e2343ae9e3bb37aa933d23b918cfa8a173cb3df743a161cca21ad3b707eed4279daf59ada6a8c273da95d8f49c1e45a96624f63604eeec4e16d9bf63415580454ebbc92e9fac6a6f146f036123aed8b0ad75be59f44cc3644f483976e9933f85ea1defd6f9caa7659e8ab6097ede0959b75357e7a932e6b173aeedb2ef08d1b8bfb468490a3c59eec2b4d4183f4da70456a327ddbb89d68f5acc52cdc1c100000047d105f334f66661f9d78692e0897f7704fd2e34fe17a2d475d23d39e790070000008712d308a2b3616c8c95051753e340258cd1819fde0bc373d783d6c36e62e442acb13f087ee7381bf7036db19e9bf31dc20206fdd7787c6ecfab143f11a898914a1a2d0be2e8ee7cd12658ac2af2d085695e550f5c1ea7968510a1bf5e0002becae7bea22362b90055ce9cf40581ff940c0d5ebd1dd3a8aaac8cf6351689b2e07f33620b390ff7d6be088a4954790495326ea7839fe7ae5b41922f24803c9ebc9214f0fa0dd32f48505888b6906dd77fd58e755c72c0b05169ff7e02b752025dbeb7f6820de0115b5c94893e359c1f2ccf3f604817890df2bc1b718f2551ae7a508045681e626af675964326f28413bea61f07ae0f7a1d7cfb3291e7beed6e7be2b767564dd754a7d915b758481ab76a6fe1ee117c233b48ba22be68419d7a7cbe7a8f8ad37197162a6cc9dd488abd209a44390e48f716f54cf58e1880b56b52718b8a6e77e1ff852f8169dbcf1e70dca171d3c51f3928bf8cf2415304d92db401079347ee436498bd18693bd06500ef5624917ffca006645b0455aea3f31797b9efac628cd4a64b8714ea376bbcae25f2520d039103086b6fd45265f9cf7e3fcc22942c6de35bc04450d600b6e0d7c315bf30402e3f4aea8cfc65e0a6c2c1d9438158b130b72533f2e557f0f7846ce88c846df075f0db0454f401e8bfd2b45ac1eb516390d56104b686f36db8bc6c3cdb0517b3befa10680bf26b5b269915ff03f3be613b9dc297845e1cc011b8f3ffec"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) close(r0) 11:06:30 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2c00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:30 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000026c0)=[{0x0}], 0x1, 0x0) 11:06:30 executing program 4: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000001500)) 11:06:36 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:36 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [], 0x32}, 0xb) 11:06:36 executing program 1: 11:06:36 executing program 0: 11:06:36 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x2f00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0xffffffffffffff16, 0x0, 0x20000, &(0x7f00000000c0)={[{@uqnoenforce='uqnoenforce'}]}) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xc5f5, 0x80000) getpeername$netlink(r0, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000100)={0x1}) 11:06:36 executing program 1: 11:06:36 executing program 0: 11:06:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0xffffffffffffff79, 0x0, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB='uqnoedforce,\x00']) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./bus\x00', 0x0, 0x4, &(0x7f0000000540)=[{&(0x7f00000001c0)="d99727da4eea6d88362ac7fba54082185f7a54f97d17ad88ece867aef489e5e7b6b010c5fc6ce922fb394c927a69d37e5484da24bec5f2c853d897ff20a0d9ffbb542838cb4ccff1f9990d260513c8362a036b7b7b814465c416d30894fd0e481f5bcec5400faf8c93112107c0f196523c4406f1620b7689124411cbe4750bfbe7883d32bf18954a001c5be9ddfc17e5971d4e69cbf5644987c66195f332842597", 0xa1, 0x8}, {&(0x7f0000000280)="cf3629076f4d4c4c5348be2b0facfa574eaba73b99ef4ce862486dc15238b10ad6a45d080a857eca0e4499a574dd4550a5a3501e4baa6a6e0b6cd18c35cd5748b6e28cbab724f2d7cae941bfc8fb33908eeeb65890b93c8f2d2f18db5434f84a91f5c2b11143ce6513b268205ca67cb0884c5a60f731b5da37cfab76cdad887c285337adfa1a235d14b6ba4edad258b44d69924d7b4728ec1a3d4a5d9f77e1ff50a5e6bf05ba698df8dad347f6541612b8b4741b988570b2c569fb9ba6241275930541760dc8d6f47be5f9d171d746d078423c45845cc773c6f885d20ccf43dd5fab28646b5bbc83", 0xe8, 0x3f}, {&(0x7f0000000380)="482accc942d40790dafa586d854adbfb65c7983efc12d541023c45c47efc10ba897728af14cb42f582e36708edd9612e12c3201149bcd53235f1b051d9be0547f6f747d3e5a083311eebe505a47bcd62fb47d8291fabcd30aa1dde89d36195a4275556659e904250344840d4d42dd077210b879586b8563a27e1ee5c535bb916c7cdb94df8af1c923872dc7206964cbd69e5c0838cbef3e85328902a07c4c73a9036dba3abdce00b8ebe853e1c9207de86f7ca06b093a24f42f0c0f9d1163422d65a28394b5b432520b4223264dc4c3d80af1a5b1a9ecf2c196378b354adff", 0xdf, 0x8}, {&(0x7f0000000480)="8da58babf53e5af9420ac5d5b7ae57db1cf8a11c4397ff9797b6f6ab4805455b78d72466ebab9dfa2d6dec6f2fe09278fe0bfc5576d9b2ea0ef1ce6d5b964d4532300fc77d54740a8f22dc90371a45660786fb7346727e77eca540dda7951d44a35d6f67b0c8e623be21a2e0d544ebca37a07f88b7db6aed0293c4903b0aad4442ed6a5e87bc2fbb31cbce2ec5a3b2eae38a0e6058edcf2c7c7c1e5ca577e26f1b9ea8e934270e5e325d73cfd83ecc", 0xaf, 0x93f}], 0x1000, &(0x7f00000005c0)={[{@nolargeio='nolargeio'}, {@uquota='uquota'}, {@pqnoenforce='pqnoenforce'}, {@nouuid='nouuid'}, {@noalign='noalign'}, {@nolargeio='nolargeio'}, {@pqnoenforce='pqnoenforce'}, {@barrier='barrier'}, {@noalign='noalign'}], [{@appraise_type='appraise_type=imasig'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'system,wlan1))mime_typeGPL'}}, {@fsname={'fsname', 0x3d, 'md5sum]^\':em0'}}, {@smackfsdef={'smackfsdef', 0x3d, 'nodevwlan1'}}, {@fsmagic={'fsmagic', 0x3d, 0x7f}}]}) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x1}) 11:06:36 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3000000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:36 executing program 0: 11:06:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000100)={@rand_addr=0x20, @loopback, @local}, 0xc) [ 1549.104350][ T7377] XFS (loop4): Invalid superblock magic number 11:06:43 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:43 executing program 1: 11:06:43 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [], 0x32}, 0xb) 11:06:43 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3400000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) syz_open_dev$vbi(0x0, 0x1, 0x2) 11:06:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@uqnoenforce='uqnoenforce'}]}) 11:06:43 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3800000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1556.309629][ T7499] XFS (loop4): Invalid superblock magic number 11:06:44 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [], 0x32}, 0xb) 11:06:44 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3c00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:44 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:44 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0xffffffffffffff08, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='smackfsroot=xfs\x00,dont_measure,mask=^MAY_READ,uid=', @ANYRESDEC=r0, @ANYBLOB=',had=\x00\x00\x00\x00\x00', @ANYRESDEC=r0, @ANYBLOB=',context=root,\x00']) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) write$P9_RLOCK(r1, &(0x7f0000000200)={0x8, 0x35, 0x1}, 0x8) 11:06:50 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) syz_open_dev$vbi(0x0, 0x1, 0x2) 11:06:50 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [], 0x32}, 0xb) 11:06:50 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x3f00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:50 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x60000, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, r3, 0x404, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffe0000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x10) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000004c0), 0x4) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="75716e6f656e70ef78cc592822f06f55c44a709b9f08666f7263652c005088b3a1338e892b84c78c6dd1e46a19eb3f2c40ea42f8c767dc8cf3244a8239b3f589551e10d33fbdaf59468a2afe98db4b7d2bdcc2d743ce3e94d60dd777ea58608ebbea4349efa5d7e1fc5bbfad49042321fb06f0d32f7f3a909cff046846ca17752acdb3265e95b2ac7b4a8d19563bb7f7a0cbd2e1a6d331b2853e8d6ff4f97e25e5562507d1e4b38a617017d3e1911a000000000000000000b7f01ae383084676363ed773b2c479751e92ea49b1b76e408cb65d3e3177ba812de00ee6d0591ec99f8228a183be8e23a15e"]) r4 = dup(0xffffffffffffffff) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x340, r5, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff0703}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2c5d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x80, @mcast1, 0x845}}}}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6057}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x44e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb95}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9000}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xfffffffffffffff7, @mcast1, 0x401}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6435f7c3, @local, 0x4a0e}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @local, 0x5}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfa}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xea8f437}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x64}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000000) ioctl$KDSETLED(r4, 0x4b32, 0x80000001) 11:06:50 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:50 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:50 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4000000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1562.709820][ T7851] XFS (loop4): unknown mount option [uqnoenpxY("oUJpforce]. 11:06:50 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:50 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) 11:06:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@noattr2='noattr2'}]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x4adf) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f00000000c0)) 11:06:50 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4700000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1563.347037][ T8084] XFS (loop4): Invalid superblock magic number 11:06:56 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:06:56 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) 11:06:56 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) syz_open_dev$vbi(0x0, 0x1, 0x2) 11:06:56 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4800000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:56 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="753449b887f2828bba84cd466ad32b45a349a9fd08f0ad79b549ff9890fdac5970129432d6baf15d29a61142336eaeb4940ec581ea7ad4d5bd78f362937f53714dd1fe252db917cb69e1b3b0f518763db06566c5f90662a63f272a2b9f0753467b4813903df24a83b52eb03d8fb132e7e2c7c72a63ce59a91e196b6c1227b46e0caf4a165d12a5aa7b450471348d09dd7a7fc516caa7a94de66324dd66b09c9a4007e71d6219fbc359f688f0000074281c6ae8d4d01f708f059c95aa0e95fd00"/206]) 11:06:56 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:56 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) [ 1569.075597][ T8211] XFS (loop4): unknown mount option [u4I򂋺Fj+EIyIYp2ֺ])B3nŁzսxbSqM%-iᳰv=efb?'*+SF{H=J.=2*cYkl'n J]{Eq4 zʧMc$f@bY]. 11:06:56 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x4b00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:06:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) syz_open_dev$vbi(0x0, 0x1, 0x2) 11:06:57 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:06:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x6100000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:03 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(0x0, 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:03 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:03 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200302, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0xf}, 0x1, 0x0, 0x3, 0x1, 0xfffffffffffffffc, 0x9}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="6eaec3ee", @ANYRES32=0x0], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x80000000}, &(0x7f0000000180)=0x8) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./bus\x00', 0x9, 0x9, &(0x7f0000000880)=[{&(0x7f00000002c0)="4157f55d80537b4f8d544bdd6daf7af9c7ea51916f7f6b08b4581a8d71ab820946a54bda0bc404ee6d28728ffa400bccd8dc6222d6ffb4535bed1a3b8f56c06d4210fd1b6861c9683d304fec3125cc5e22791d1d998dcfb3fa99c36d596d837989c219dbde5a9ee36fe2b09d4796db2c2a18ea34622c97143175e75472060c25c1ef97c71a1b4de1ce6f8ba7efc8ebd4d638e2ed1fbf6abc6aa366ee6611fb08668d5e4f114ef656456616d780211d47e7c8e09a3873a3d0d25410e2b63d183e974ecaaa49d2bbd8c847", 0xca}, {&(0x7f00000003c0)="5bed9480b8e26d7aeb80981780040c932ff2a291bf81ba5fe7a21d71a255636c93e43a71f5d14c2b37ceb29ac17c7fc13ca4eed268c2e7027450370eb028ac300751fbc02793a37ab9f35230f1640052b6d9c3543e43d39d3f8ceefc99d93246d6567dc2ed8bcb19d1f6cb38185a7738ea031790e2aeb861d8c167dde7f76adf779d06f9e3e18f7f07d8f83a1788f13c88f5249e3894b7d05cb2bf30", 0x9c, 0x101}, {&(0x7f0000000480)="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", 0xfb, 0xfffffffffffffff9}, {&(0x7f0000000580)="eae9246ab2bdaab0b563ce5208e933ae", 0x10, 0x3}, {&(0x7f00000005c0)="4c395a78e6e1fe89bff70d", 0xb, 0x5}, {&(0x7f0000000600)="1a4a43dca0e27d0126a0987a645a0e84d95a0ffaa4087ae74dcf2e133c55324a34bb1998fedbc22c478a6f96529a2326f3725e956a1b1a9f9730edbc52151ef9481fc8d847a8369bc977a7db5acb109abdd06469c8572e55671f618f1cefbab43801e0e6a49cd0635cb850ec3879aeba0e407348c8ad3a39a6ebc1f194655e8f4889dee97f27baaa286232afe741e17f6959480b501cd114ad3b9ceb37838f0edbe7fc9d22ebcfe46a741d04b8ad7f1141e36b62", 0xb4, 0x4}, {&(0x7f00000006c0)="76659dae915b770a", 0x8, 0x1}, {&(0x7f0000000700)="e508d2e24012d09545ed18ad28d71d15370bb46307b5516ea3e7dede889cd9e5bd44e50380073226bcded40304a4f50715bcb051f65051eb5b949a6062805eeb14bec63b08cfbb142e256c1fe956f961b7216ba0e303a87893a4b175642ca67e82911fa6def6d838b6de1eb61bc44e74d7a30629d2c50e201d8d6747edb7", 0x7e, 0x401}, {&(0x7f0000000780)="5b566d25f9e2a40f777ddf70c188d11de8c1724bed37a415f7e22cff4e479772321b4bc62046133c17dfc0f77539beec0c975ced80f0f82055171420f5e7633cd3efb9b08f49418918e826879f119225686534963f958a64414f24188d6c7fa0cb3653076f6f08133865b0ea92218711e7db46480b15cc5ad708d6862a3cee9e8a1d69a63ae0bb815ad4898e64b719a3f879e7d3acc24cf20440286bd19d5df16dd62fcf202b8b17883afe2f120af37ec3bce13edb501cebefedf12e9dbf9cf1c2828c07ade1d1b53e10c6f7880fdded158a61944feace9ca115c8", 0xdb, 0xffff}], 0x210810, &(0x7f00000009c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742cb0adf0af53632c3ef502d68f7ace0ebd2f4a1f38f74fa2fb0944a7f1e2397e45622b2de2657bc5"]) 11:07:03 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x6300000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:03 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x7100000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:03 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:03 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1575.761045][ T8365] XFS (loop4): Invalid superblock magic number 11:07:03 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x7300000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:03 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:09 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(0x0, 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@uqnoenforce='uqnoenforce'}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x4, 0x80000001}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1}, &(0x7f0000000200)=0x8) 11:07:09 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:09 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x85ffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:09 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:09 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:09 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x9cffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:09 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) [ 1581.995988][ T8515] XFS (loop4): Invalid superblock magic number 11:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:10 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(0x0, 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="75006e0abccb70e42073eb03ca03a5c07000"]) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10040, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 11:07:15 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:15 executing program 1: r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0x9fffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:16 executing program 1: r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1588.198158][ T8668] XFS (loop4): unknown mount option [u]. 11:07:16 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xff00000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:16 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:16 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cd", 0x5) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:16 executing program 1: r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:25 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xff9f000000000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:25 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:25 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 1597.558458][ T8922] input: syz0 as /devices/virtual/input/input11 11:07:25 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:25 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x0, 0xffffffff00000000}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:25 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:25 executing program 4: clock_gettime(0x6, 0x0) lsetxattr$security_ima(0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 11:07:31 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x100000001) 11:07:31 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:31 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:31 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) fallocate(r1, 0x11, 0x0, 0x100000001) syz_open_dev$vbi(0x0, 0x1, 0x2) 11:07:31 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:31 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 11:07:31 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:32 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:07:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:39 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:39 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x4}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 11:07:39 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:39 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:39 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:07:39 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 11:07:39 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:39 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x5}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:39 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:39 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:07:48 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:48 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:48 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x6}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:48 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:07:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:07:48 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x7}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:48 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:48 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:49 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x8}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:49 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:07:55 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:07:55 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:07:55 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:55 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:55 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xa}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:55 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:07:55 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, 0x0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:55 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xc}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:55 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:07:55 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, 0x0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:07:55 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xe}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:07:55 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:08:05 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:05 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, 0x0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:05 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xf}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:05 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:08:05 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:08:05 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040), 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:05 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x10}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:05 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:06 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040), 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:08:06 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:06 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x14}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:06 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:14 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:08:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040), 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:14 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x18}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:14 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:08:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7", 0x6) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:14 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1b}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:14 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:14 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1c}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:14 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:23 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:08:23 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 11:08:23 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7", 0x6) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:23 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:23 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x23}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:23 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7", 0x6) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:23 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:23 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:23 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2b}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:23 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:24 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf1", 0x9) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:32 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:08:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:08:32 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:32 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:32 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2c}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf1", 0x9) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:32 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:32 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2f}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf1", 0x9) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:33 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:33 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:33 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x30}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:42 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:08:42 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:42 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d", 0xb) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:08:42 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x34}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:42 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:42 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d", 0xb) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:42 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x38}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:42 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:42 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d", 0xb) futex(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 11:08:51 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3c}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:51 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:08:51 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:08:51 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:08:51 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:51 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:51 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x47}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:51 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:08:51 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:08:51 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 11:08:52 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x48}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:08:52 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00\x00:\xc23/\x8c^\x00s\xda\xb8\x8c\xfb\x99\xcb\x83s\x96\x1d_\x9d\x9eg\x05\x8bb\x04=\xb1#8\xfc\xf1\xf5\xe5D-5\xf1\xd2\xb2\xc8\xcc\xd03\xad\xf1\xb2\xd5\x97\xf4w\xb4\x0e', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) write(r0, &(0x7f0000002040)="79baa3c6cdc7d14cf19e4d5c", 0xc) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:09:00 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:00 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:00 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3cc, 0x0) 11:09:00 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000014"]) 11:09:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:00 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x4b}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:00 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3cc, 0x0) 11:09:00 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:00 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x60}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netlink\x00') sendfile(r0, r1, 0x0, 0x10000008) 11:09:00 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3cc, 0x0) 11:09:00 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, 0x0, 0x0, 0x0) 11:09:08 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:08 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:08 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x61}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, 0x0, 0x0, 0x0) 11:09:08 executing program 1: r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000480)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)}, 0x20000800) perf_event_open(0x0, 0x0, 0x0, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) ioctl$TUNSETLINK(r2, 0x400454cd, 0x338) 11:09:08 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:08 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x63}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(r0, 0x0, 0x0, 0x0) [ 1700.969369][ C1] net_ratelimit: 4 callbacks suppressed [ 1700.969380][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1700.981252][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1701.119388][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1701.125583][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:09:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0x6, 0x0, 0x0, 0x2, [{}, {}]}) 11:09:09 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:15 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x71}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:15 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x100000020000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_ifreq(r1, 0x89fd, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) 11:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) [ 1708.092816][T10569] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 11:09:16 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x73}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:16 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:16 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x300}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:16 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x100000020000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_ifreq(r1, 0x89fd, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) 11:09:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) [ 1708.636806][T10702] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 11:09:25 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x500}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:25 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:25 executing program 1: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x600}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:25 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:25 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:09:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:25 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x700}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:32 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:32 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:32 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xa00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:32 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:09:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:32 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:32 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xc00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:32 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:09:33 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r0, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:41 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:41 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:41 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:09:41 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xe00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:41 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r0, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:41 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r0, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:41 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:42 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xf00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:42 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) 11:09:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:42 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:49 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1400}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:49 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:49 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:49 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) 11:09:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:49 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1800}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:49 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:49 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) 11:09:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:49 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1b00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:49 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:49 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) getdents(0xffffffffffffffff, 0x0, 0x0) 11:09:49 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1c00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:55 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:09:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:09:55 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:55 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) getdents(0xffffffffffffffff, 0x0, 0x0) 11:09:55 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:55 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f942943"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:09:55 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2300}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:09:55 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) getdents(0xffffffffffffffff, 0x0, 0x0) 11:09:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:09:56 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f942943"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:05 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:05 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2b00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:05 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:10:05 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f942943"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:05 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:10:05 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2c00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:05 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0e"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:05 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:10:05 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2f00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:12 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:12 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0e"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:12 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:12 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:12 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3400}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:12 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0e"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:12 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:12 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3800}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:20 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:20 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0ead"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:20 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:20 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3c00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:20 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:21 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0ead"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:21 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3f00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:21 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:27 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:27 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0ead"], 0x1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:27 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x4000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:27 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:27 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x4700}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:27 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:27 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:34 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:34 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x4800}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:34 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:34 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 11:10:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(0x0, 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x4b00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:35 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:35 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 11:10:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(0x0, 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x6000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:41 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:41 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x6100}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:41 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:41 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 11:10:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(0x0, 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:41 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:41 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:41 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x6300}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:41 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:48 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:48 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:48 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x7100}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:48 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:48 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:48 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x7300}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:48 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:57 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:10:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x9fff}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:57 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:57 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:57 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:10:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:10:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xff00}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:10:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"cf9f4c2367ca7d20071167e36c2c2b62"}}}}, 0x90) 11:10:57 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:10:57 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xff9f}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:05 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:11:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:05 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:11:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:11:05 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x200000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:05 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:11:05 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:11:05 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:11:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:05 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47442a"], 0x10094) 11:11:05 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x600000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:05 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:11:12 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:11:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:12 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:12 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) getdents(r1, 0x0, 0x0) 11:11:12 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 11:11:12 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:11:12 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) getdents(r0, 0x0, 0x0) 11:11:12 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:12 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 11:11:12 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) 11:11:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:13 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:19 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:11:19 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) 11:11:19 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 11:11:19 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 11:11:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, 0x0, 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:19 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x4000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:19 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 11:11:19 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x0) 11:11:19 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x5000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:19 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) 11:11:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, 0x0, 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:19 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) 11:11:26 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:11:26 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 11:11:26 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x6000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:26 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x0) 11:11:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, 0x0, 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:26 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) 11:11:26 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) 11:11:26 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(0xffffffffffffffff, 0x0, 0x0) 11:11:26 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x7000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:26 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x0) 11:11:26 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x911) 11:11:35 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:11:35 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x8000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:35 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) 11:11:35 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(0xffffffffffffffff, 0x0, 0x0) 11:11:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:35 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:36 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) getdents(0xffffffffffffffff, 0x0, 0x0) 11:11:36 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:36 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) 11:11:36 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xa000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:36 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:45 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:11:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0xc2) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f00000001c0)=0x20) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 11:11:45 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) 11:11:45 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xc000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:45 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:45 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:45 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xe000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:45 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de"], 0x13) 11:11:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6a2f5d0023f47bb711415a891b0f018b54f3"], 0x0, 0x12}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x8, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 11:11:45 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:51 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:11:51 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00'], 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 11:11:51 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0xf000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:51 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:51 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de"], 0x13) 11:11:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:51 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:11:51 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de"], 0x13) 11:11:51 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x10000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:11:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x35f, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="14bc360000000056b50000ff000308b800000008000003000800050f000000000000000000000040000000"], 0x1}}, 0xfffffffffffffffc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaace6, 0x0, 0x0, 0xeb) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:11:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:11:52 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344"], 0x1c) 11:12:01 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:12:01 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:01 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x14000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:01 executing program 1: socket$unix(0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) alarm(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 11:12:01 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344"], 0x1c) 11:12:01 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:01 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344"], 0x1c) 11:12:01 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x18000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) [ 1873.399515][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:12:01 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:01 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce19915"], 0x21) 11:12:08 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:12:08 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1b000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:08 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce19915"], 0x21) 11:12:08 executing program 1: socket$unix(0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) alarm(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 11:12:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:08 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce19915"], 0x21) 11:12:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:08 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x1c000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1880.688921][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:12:08 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47"], 0x23) 11:12:08 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x23000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:14 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:12:14 executing program 1: socket$unix(0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) alarm(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 11:12:14 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:14 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47"], 0x23) 11:12:14 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2b000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:14 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2c000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:14 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f47"], 0x23) 11:12:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:15 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x2f000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:15 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:15 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f4744"], 0x24) [ 1887.236650][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:12:24 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:24 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x30000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:24 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:24 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f4744"], 0x24) 11:12:24 executing program 1: socket$unix(0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) alarm(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 11:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:24 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d2b4cfaad13cab7e98cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1bac116a4ae39f9429436c5e0eadfe"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321212c0f0df8067664092d43ff4c3a4507de5c1e25103996835344f39ce199151f4744"], 0x24) 11:12:24 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x911) 11:12:24 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x34000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1896.505631][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:24 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) 11:12:31 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) chmod(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {0x0, 0x0, 0x5}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0xff, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x98, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x9, 0x6, 0xe8b9, 0x0, 0x3, 0x100, 0x1000, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x7, 0x3, 0x0, 0x7, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x5d02, 0x0, 0xfffffffffffffffc, 0x10001, 0x0, 0x2, 0x80000001, 0x0, 0x77, 0x5, 0xb1, 0x0, 0x6, 0x54c, 0xb71, 0x7, 0x481a3d8d, 0x0, 0x1, 0x9, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffc00, 0x5, 0x0, 0x9], [0x0, 0x9, 0x10000, 0x6, 0x8, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x2, 0x8e, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x2, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0xffffffff00000000, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7, 0x0, 0x6], [0x0, 0x7, 0x0, 0xbb, 0x1e3, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x8000000000, 0x3, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x0, 0x3, 0x0, 0xf4, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x88c8, 0x80000000, 0x1f, 0x5, 0x1000, 0xd1, 0x0, 0xe41f]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) connect$llc(r1, &(0x7f0000000400)={0x1a, 0x31e, 0x1, 0x3ef9, 0x621, 0xa6, @random="47f6bcdd048e"}, 0x10) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getpgid(0xffffffffffffffff) 11:12:31 executing program 3: socket$unix(0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) alarm(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 11:12:31 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x38000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:31 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) 11:12:31 executing program 1: socket$unix(0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) alarm(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 11:12:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x100000001) 11:12:31 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x911) [ 1903.974111][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1903.979181][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:12:31 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3c000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 11:12:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 11:12:32 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 11:12:32 executing program 5: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}], {0x95, 0x3f000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 1904.707036][T13526] kasan: CONFIG_KASAN_INLINE enabled [ 1904.727410][T13526] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1904.737775][T13526] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1904.744766][T13526] CPU: 1 PID: 13526 Comm: syz-executor.1 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1904.754289][T13526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1904.764642][T13526] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 1904.770526][T13526] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 1904.793919][T13526] RSP: 0018:ffff888059a0fac0 EFLAGS: 00010206 [ 1904.800105][T13526] RAX: dffffc0000000000 RBX: ffff888064546140 RCX: ffffc90008162000 [ 1904.808529][T13526] RDX: 0000000000000005 RSI: ffffffff862e29d6 RDI: 0000000000000028 [ 1904.816520][T13526] RBP: ffff888059a0fae0 R08: ffff88808bdc0240 R09: ffffed1012634949 [ 1904.824795][T13526] R10: ffffed1012634948 R11: ffff8880931a4a43 R12: 0000000000000000 [ 1904.832776][T13526] R13: ffff88805bddac80 R14: 0000000000000000 R15: 00000000ffffffe0 [ 1904.840777][T13526] FS: 00007f865487f700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1904.849707][T13526] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1904.856335][T13526] CR2: 00007f226df1f518 CR3: 0000000059deb000 CR4: 00000000001406e0 [ 1904.864347][T13526] Call Trace: [ 1904.867652][T13526] tls_sw_sendmsg+0xe38/0x17b0 [ 1904.872436][T13526] ? tx_work_handler+0x180/0x180 [ 1904.877381][T13526] ? retint_kernel+0x2b/0x2b [ 1904.881980][T13526] inet6_sendmsg+0x9e/0xe0 [ 1904.886401][T13526] ? inet6_ioctl+0x1c0/0x1c0 [ 1904.891115][T13526] sock_sendmsg+0xd7/0x130 [ 1904.895801][T13526] __sys_sendto+0x262/0x380 [ 1904.900519][T13526] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1904.905890][T13526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1904.912132][T13526] ? put_timespec64+0xda/0x140 [ 1904.917751][T13526] ? nsecs_to_jiffies+0x30/0x30 [ 1904.922594][T13526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.928912][T13526] ? __x64_sys_clock_gettime+0x16d/0x240 [ 1904.934746][T13526] __x64_sys_sendto+0xe1/0x1a0 [ 1904.939522][T13526] do_syscall_64+0xfa/0x760 [ 1904.944018][T13526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1904.949923][T13526] RIP: 0033:0x459829 [ 1904.953810][T13526] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1904.973624][T13526] RSP: 002b:00007f865487ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1904.982038][T13526] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 1904.991217][T13526] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000004 [ 1904.999382][T13526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1905.007385][T13526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f865487f6d4 [ 1905.015554][T13526] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 1905.023523][T13526] Modules linked in: [ 1905.030150][T13526] ---[ end trace 0c291106de1450a6 ]--- [ 1905.035919][T13526] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 1905.042284][T13526] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 1905.070895][T13526] RSP: 0018:ffff888059a0fac0 EFLAGS: 00010206 [ 1905.077015][T13526] RAX: dffffc0000000000 RBX: ffff888064546140 RCX: ffffc90008162000 [ 1905.085060][T13526] RDX: 0000000000000005 RSI: ffffffff862e29d6 RDI: 0000000000000028 [ 1905.093670][T13526] RBP: ffff888059a0fae0 R08: ffff88808bdc0240 R09: ffffed1012634949 [ 1905.102772][T13526] R10: ffffed1012634948 R11: ffff8880931a4a43 R12: 0000000000000000 [ 1905.110896][T13526] R13: ffff88805bddac80 R14: 0000000000000000 R15: 00000000ffffffe0 [ 1905.118896][T13526] FS: 00007f865487f700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1905.127889][T13526] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1905.134534][T13526] CR2: 0000000000fe91e0 CR3: 0000000059deb000 CR4: 00000000001406f0 [ 1905.142568][T13526] Kernel panic - not syncing: Fatal exception [ 1905.149904][T13526] Kernel Offset: disabled [ 1905.154534][T13526] Rebooting in 86400 seconds..